Hotel Access Control Explained

By Brian Rhodes, Published on Dec 23, 2019

Hotel access control does not work like typical commercial access control because doors in hotels are not typically directly connected to a central server.

How does it work then? How can the hotel assure that cards are used properly? Inside this note, we cover:

  • Hotel locks not typically networked
  • Why mobile key apps control more than doors
  • Credential overviews and prices
  • Typical hotel door lock price
  • How systems protect against unapproved access
  • Advantages of hotel vs commercial access systems
  • Safety and security concerns with hotel access

Locks *** ********* *********

*** ******* ****** ********** in ********* ******* '***********' and ********** ****** ******* is *** **** ** the **********.

* *****/*********** **** **** is *** ********* ** a ****** ** ***** valid ** ******* ***********, rather **** ********* **** a ********** '***** **' to ****. *** ********** itself ******** *** ********* and **** ****** ** activate *** ****.

** ********, ** ****** system **** **** *** credential ** ******** * request *** ******. *** credential ****** **** *** issue * ******* ** open *** ****, ** simply ********** *** ****** against ** '********' ******* for *****.

** ********, *** ********* portions ** *** ********** can ****** **** * central ********** ********.

The **** ** ******

* *********** ******** ** Hotel ** *********** ****** is *** ************* ** Bluetooth *** *** ***** room **** ** ******** to **-***** ** ********* room ****.

*** **** ** ***-***** credentials ****** ******** **** physical **** **** ** not *****, ************ ******** patrons ** *****-** *** unlock ***** ***** ******* needing ** ****** ***** desk ******.

***** ****** *********** ***** do *** ******* **** or ****-***** ********** ** the **** ****, *** the ************* ********** *** managed ** *** *** via *** ******* ********* smartphone.

Apps *** ********* & *********

**** ***-***** ***********, ***** access ******** *** ******** are ***** **** ********* to *****.

*** *******, ********* **** pools, ****, ** ****** can ** '****** **********' via *** **** ****. Patrons *** ***** **** keys **** ******, ** even ***** ** ***** consumables *** ** ******* using *** **** *** debited ** *** ****'* account ****** *** ****.

**** ****** **** ***** users ** ******* **** heating/cooling, ***** *****, ** room ******* ***** **** the ***, ** **** as ***** *** *** to ****** ********** ***** or ******** ***** ** user *** ******** ** even ********* ** * certain *****.

Hotel *********** ********

** *** *********** ********, access ******* ******* ******* of **********, ***-********* **** reader/locks, * ***** ***, or * **** ********** and ******* ****** *****.

** **** *****, *** central ********** ***********, ******* at *** ***** ****, encodes * ******* **** common ****** ****. *** mobile-based *******, *** **** data ** ****** ** a **** **** *** BLE ** ***:

***** ******* ****** ***:

  • ********: * ****** **** to ******** *** ******* as * '***** ****', 'Master ***', '************ ****', or ***** **** ** role. '***** *****' ********* open *** ****, ***** a '****** ***' **** may **** **** ***.
  • ***** ****/****: *** **** ****** a **** ** **** to **** * ****. This *** **** ******* a '***** ****' ** calibrate ******* **** ****** time.
  • **** ******: * ****** ** value ******** ** *** lock/room *** **** *****. This ********* ****** ******* to *** **** *** guest ****.
  • ******** ******: * ****** **** that ********** *** ********** property/floor/wing * **** ** encoded ***. **** ******** using *** **** *** 'Room ***' ** ******** facilities.

*** **** **** ****** on *** ********** ****** to ********* **** ** should ******, ** *** system ****** ** *********** not ********* *** **** lock ** '*******' *** makes ** ****** ******** only **** * **** is *********.

Keycard ******

******** **** ** ***** for ***** ******* ** make ******** *****. ****** brass **** ****, ******** must ** ********** ** cheap ****** ** ******* after * ******-***.

*** **** ****** ***** are **** **** ***** that **** ****** $*.** - *.** *** ****. This ******** **** ******** 3.375" * *.***", *** same **** ** * credit ****, *** *** typically **** ** *********** PVC *******.

** **** *****, *** cost ** ***** ***** are ******* ********** ** advertisement ***** ** ********* incentive ********, ***** ***********, or *********** ****** * hotel:

Magstripe ******* *****

* *** ***** ** these ***********: *** **** stripes ** ***** ***** are * '******' ********** ************* ****** ******** ** more ********* ***** ** credentials **** *********** **********.

***** **** *** ****** in *** ******** '***************' of ***** ***** ** subjected ** **** **** magnetic *******, **** ********* is ***** ********* ** a ******** *********** ** the **** ** '***** service ****' ** *** issued **********. *** ******** card ******** ****** ******** the ***** ******* ** expiring ***** * ***** time, ***** * *** days.

RF ** *********** **********

** **** *****, ***** locks ******* ****** *********** formats **** ** ********** access, ***** ****** *** DESFire *******.

***** ***** ***** ** credentials ** *** ************* change ********* ** ********** of *** ******, *** otherwise *** *********** *********** that *** **** ** a *** **** **** patrons *** ******* ******** with.

Door **** *****

***** *** ***** ** door ******** *** **** greatly ********* ** ****** and ******, '*****' ***** can ** ********* *** less **** $*** ***. Some ******* ****** **** in '****** *****' ****** sell *** **** **** $75 ***. ** ********, enterprise-grade ********** ********** ****** control ******* ***** **** upwards ** $*,*** *** door.

** *******, **** ***** are ******** ** *** only *** **** ******* door ***** ***** *********** or ******* *******. ****** other ***** ** ********** access *******, *********** ******* only **** **** * specific **** ** **** and ****** ** ******* to ******** *****.

Protecting ******* ********** ******

* ****** ******** **** arises **** *********** ******* is "*** **** *** door **** **** ** deny ** ****?"

***** * ****** *****-**/*****-*** interval, **** ****** ** determined ** *** '***** date *****' ** ****** encoded ** *** ****. When *** ***** *** date ** *******, *** encoded **** ** *** card ** **** ** 'invalid' ****** * ******* point. *******, *** ******* situations, **** ********** ***** check-outs ** ******** *****, employee ***** **** * vital ****. ** *********** for ***** **********, ** is * ****** *********** that ***** *** *** housekeeping ***** *** '*********' every ***, *** *** 'internal' ***** ** * hotel **** **** *** updated ***** **** *** housekeeping ***** ****** ***** cards ***** ****** ***** rounds.

************, ******** ***** *** not *********** ** *** same ****** ***** ** guest *****, *** *** be ********** *** ********** access. *******, * ****** feature ** ***** ***** is *** '********** ********' deadbolt **** ******** *** external **** ****** **** thrown. *** ***** *************, it ** ****** ** see * **********, ***** door **** ** *** lever **** ****** ****** in ** *********.

Advantages ** *********** *******

*** **** ******* ************** of ***** ****** *******, compared ** **********, ** they *** *********** ** purchase, ********, *** *******.

******* *** ****** '**** tech' ********** ***** ******* give ******, *********** * new **** *** ******* it ** * ***** is **** ****** *** inexperienced ****** ** ******, and ******* ** ***** disposable ****** *** ****** be ****** **** ****** than ******* '*** **********' like *********** *******.

***** ********** *******:

  • ******* ********** ***** ** program
  • **** ** ********** ***** by ************* ****
  • *** ** ********** '****** off' ** ******** ********** deadbolt **** ****** ****
  • ********** ******** **** ***** emergency ****** ** *** times
  • *********, **** ******** **** up ** *** - 500 ****** ******** *** forensic ************** ** ******

Disadvantages ** ***** ** ********** ****** *******

*******, *********** ********** ****** has *** ******** *** access ********** *** **** security **** ***** ******* generally ***'*:

  • *********** ************** ** ********* support
  • ******* ** ******* ******** access ********* *** ****** locations
  • *********** *** ** *********** revoked ** '***********'
  • ***** *** *********** ** 'locked ****'
  • *********** *** **** ** a ****-********* ***** *** carry ******** ***********
  • ******** ** *** ********* powered ** ******* ***** and ** **** ******** and ******* ** ********
  • **** ********* ** *** events ****** ** ***********

Hotel ******* *** ****** ****** ********

***** ****** ******* ** not * ****** ******* typically ******** ** *** security **********.

***** ********** *****, ******* profits *** **** *********** usually ****** ** ***** systems ***** ********* **-***** by ***** *********** *****.

** *******, *** ******** approach ** *********** '*********' access ******* ** **** as '********' *** ******* compared ** *** *** cost, *******-***** ************ ***** in *** *********** ******.

*********** ****** ************* **** and ******* ***** *** products, ***** ********* *** traditional ********** *******. **** business ***** ** ********* for ******* *******:

  • ******* *** **** ***, typically ******* *** ****** threshold ** ********** **** pursue.
  • ** *** **** **** of *** ****, *** manufacturer ** **** ** control *******. ***** ******* depend ** *** '***' of *********** ******* ******, and ** * ****** they **** *** **** hardware *** ************ ***** near ****.
  • *********** ****** ********* ***** 'keycard *******' ** '****** items', *** ***** ****** buy *********** ******** (*****, battery *****) **** ********** pricing ******** **** *********** supply ************, ****** **** security ***********.

Hotel ****** ******** ********

******* ****** ********* **** magnified *** ***** ** hotel ****** ******* ******** to ********** ******. **** this *******, ***** * careless ** ******** ***** encoded ***** ***** **** with * '****** ***' function, *********** ******** * single ***** ** **** every ****:

*** **** ********* ** this ******** *** ** avoided, *** *** ********** mitigated **** ***** ****** systems. **** * ***** networked ********** ****** ******, such ** ***** ***** immediately ** ********* ** made, *** *** **** lock ****** ********** ** simply *** **** ** remain ****** ** ******* users ***** *** ******* is *********.

[**** ******* *** ********** released ** **** *** substantially ****** ** *** end ** **** ** reflect ******** ** ***** access ******* **********.]

Comments (4)

* ********** ****** *** a ******* *** ***** chain. * ******'* **** hotel ****** ******* ** my ***** *****, ** specific ******. **'* ********* right *** ** *** Soviet-era... ************ ******** "***" software ***** ******** * medical ****** ** **********. It *** ****** **** bugs *** ***** ***** seem ** **** **** correctly.

*** ***** ******? ***** door **** *** ******* controlled (****** *'* *******). Some ***** ***** **** months ******* * ******, other ****** *** ********* every *** ****. ** course, ** **** ******** this ***** ****** ***+ doors *** ************** ** the ******* ******* ** a ***** *********** *****.

** ***** ******* *** have ********** *********, *** are ***** *** *********?

** *******, ***** ***** are *** ** * phone *** *** ** each ***** ** ** a ***** ******.

********* ******* - ******. Any **** * ***** rep **** ******* ** can ****/******* *****/*********** ****** control, * ******** ****** harm. **** ***** ** convey ** ********** ** the ***** ;-)

Read this IPVM report for free.

This article is part of IPVM's 6,604 reports, 890 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Forced Door Alarms For Access Control Tutorial on Aug 17, 2020
One of the most important access control alarms is also often ignored....
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Herta Facial Recognition Plus Masks Tested on Aug 19, 2020
Masks increase face recognition errors, but facial recognition developer...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Access Control and Video Integration Statistics 2020 on Oct 08, 2020
Video Surveillance and Access Control are two of the most common security...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Beware Rigged China Fever Cameras on Sep 08, 2020
Many China fever camera manufacturers have rigged algorithms dynamically...
US GSA Explains NDAA 889 Part B Blacklisting on Jul 31, 2020
With the 'Blacklist Clause' going into effect August 13 that bans the US...
Monitoring Alarm Systems From Home - Innovation or Danger? on Oct 13, 2020
Remote monitoring by alarm companies since COVID-19 is bringing cost savings...

Recent Reports

Motorola Solutions Total Revenue Down, Video Revenue Up on Oct 30, 2020
Motorola Solutions' total revenue is down, but video (both fixed and...
Recruiters Show 2020 On-Demand Recordings on Oct 30, 2020
Recordings from the 12 recruiter presentations are now available...
Consultants Show 2020 On-Demand Recording on Oct 29, 2020
Recordings from the consultant show are available on-demand at the end of...
Hikvision AcuSense G2 Camera Test on Oct 29, 2020
Hikvision has released their next generation of AcuSense analytic cameras...
Biggest Problems Selling Access Control 2020 on Oct 29, 2020
Access control can cause integrators big headaches. What practical issues do...
Taiwan Geovision AI Analytics and NDAA Examined on Oct 29, 2020
Taiwan manufacturer Geovision's revenue has been falling for years. However,...
Bedside Cough and Sneeze Detector (Sound Intelligence and CLB) on Oct 28, 2020
Coronavirus has increased interest in detecting symptoms such as fever and...
Fever Tablet Thermal Sensors Examined (Melexis) on Oct 28, 2020
Fever tablet suppliers heavily rely on the accuracy and specs of...
Verkada Fires 3 on Oct 28, 2020
Verkada has fired three employees over an incident where female colleagues...
Eagle Eye Networks Raises $40 Million on Oct 27, 2020
Eagle Eye has raised $40 million aiming to "reinvent video...
Hikvision Q3 2020 Global Revenue Rises, US Revenue Falls on Oct 27, 2020
While Hikvision's global revenue rises driven by domestic recovery, its US...
VICE Investigates Verkada's Harassing "RawVerkadawgz" on Oct 26, 2020
This month, IPVM investigated Verkada's sexism, discrimination, and cultural...
Six Flags' FDA Violating Outdoor Dahua Fever Cameras on Oct 26, 2020
As Six Flags scrambled to reopen parks amid plummeting revenues caused by the...
ISC Brasil Digital Experience 2020 Report on Oct 23, 2020
ISC Brasil 2020 rebranded itself to ISC Digital Experience and, like its...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...