Hotel Access Control Explained

By Brian Rhodes, Published Dec 23, 2019, 02:14pm EST

Hotel access control does not work like typical commercial access control because doors in hotels are not typically directly connected to a central server.

How does it work then? How can the hotel assure that cards are used properly? Inside this note, we cover:

  • Hotel locks not typically networked
  • Why mobile key apps control more than doors
  • Credential overviews and prices
  • Typical hotel door lock price
  • How systems protect against unapproved access
  • Advantages of hotel vs commercial access systems
  • Safety and security concerns with hotel access

Locks *** ********* *********

*** ******* ****** ********** in ********* ******* '***********' and ********** ****** ******* is *** **** ** the **********.

* *****/*********** **** **** is *** ********* ** a ****** ** ***** valid ** ******* ***********, rather **** ********* **** a ********** '***** **' to ****. *** ********** itself ******** *** ********* and **** ****** ** activate *** ****.

** ********, ** ****** system **** **** *** credential ** ******** * request *** ******. *** credential ****** **** *** issue * ******* ** open *** ****, ** simply ********** *** ****** against ** '********' ******* for *****.

** ********, *** ********* portions ** *** ********** can ****** **** * central ********** ********.

The **** ** ******

* *********** ******** ** Hotel ** *********** ****** is *** ************* ** Bluetooth *** *** ***** room **** ** ******** to **-***** ** ********* room ****.

*** **** ** ***-***** credentials ****** ******** **** physical **** **** ** not *****, ************ ******** patrons ** *****-** *** unlock ***** ***** ******* needing ** ****** ***** desk ******.

***** ****** *********** ***** do *** ******* **** or ****-***** ********** ** the **** ****, *** the ************* ********** *** managed ** *** *** via *** ******* ********* smartphone.

Apps *** ********* & *********

**** ***-***** ***********, ***** access ******** *** ******** are ***** **** ********* to *****.

*** *******, ********* **** pools, ****, ** ****** can ** '****** **********' via *** **** ****. Patrons *** ***** **** keys **** ******, ** even ***** ** ***** consumables *** ** ******* using *** **** *** debited ** *** ****'* account ****** *** ****.

**** ****** **** ***** users ** ******* **** heating/cooling, ***** *****, ** room ******* ***** **** the ***, ** **** as ***** *** *** to ****** ********** ***** or ******** ***** ** user *** ******** ** even ********* ** * certain *****.

Hotel *********** ********

** *** *********** ********, access ******* ******* ******* of **********, ***-********* **** reader/locks, * ***** ***, or * **** ********** and ******* ****** *****.

** **** *****, *** central ********** ***********, ******* at *** ***** ****, encodes * ******* **** common ****** ****. *** mobile-based *******, *** **** data ** ****** ** a **** **** *** BLE ** ***:

***** ******* ****** ***:

  • ********: * ****** **** to ******** *** ******* as * '***** ****', 'Master ***', '************ ****', or ***** **** ** role. '***** *****' ********* open *** ****, ***** a '****** ***' **** may **** **** ***.
  • ***** ****/****: *** **** ****** a **** ** **** to **** * ****. This *** **** ******* a '***** ****' ** calibrate ******* **** ****** time.
  • **** ******: * ****** ** value ******** ** *** lock/room *** **** *****. This ********* ****** ******* to *** **** *** guest ****.
  • ******** ******: * ****** **** that ********** *** ********** property/floor/wing * **** ** encoded ***. **** ******** using *** **** *** 'Room ***' ** ******** facilities.

*** **** **** ****** on *** ********** ****** to ********* **** ** should ******, ** *** system ****** ** *********** not ********* *** **** lock ** '*******' *** makes ** ****** ******** only **** * **** is *********.

Keycard ******

******** **** ** ***** for ***** ******* ** make ******** *****. ****** brass **** ****, ******** must ** ********** ** cheap ****** ** ******* after * ******-***.

*** **** ****** ***** are **** **** ***** that **** ****** $*.** - *.** *** ****. This ******** **** ******** 3.375" * *.***", *** same **** ** * credit ****, *** *** typically **** ** *********** PVC *******.

** **** *****, *** cost ** ***** ***** are ******* ********** ** advertisement ***** ** ********* incentive ********, ***** ***********, or *********** ****** * hotel:

Magstripe ******* *****

* *** ***** ** these ***********: *** **** stripes ** ***** ***** are * '******' ********** ************* ****** ******** ** more ********* ***** ** credentials **** *********** **********.

***** **** *** ****** in *** ******** '***************' of ***** ***** ** subjected ** **** **** magnetic *******, **** ********* is ***** ********* ** a ******** *********** ** the **** ** '***** service ****' ** *** issued **********. *** ******** card ******** ****** ******** the ***** ******* ** expiring ***** * ***** time, ***** * *** days.

RF ** *********** **********

** **** *****, ***** locks ******* ****** *********** formats **** ** ********** access, ***** ****** *** DESFire *******.

***** ***** ***** ** credentials ** *** ************* change ********* ** ********** of *** ******, *** otherwise *** *********** *********** that *** **** ** a *** **** **** patrons *** ******* ******** with.

Door **** *****

***** *** ***** ** door ******** *** **** greatly ********* ** ****** and ******, '*****' ***** can ** ********* *** less **** $*** ***. Some ******* ****** **** in '****** *****' ****** sell *** **** **** $75 ***. ** ********, enterprise-grade ********** ********** ****** control ******* ***** **** upwards ** $*,*** *** door.

** *******, **** ***** are ******** ** *** only *** **** ******* door ***** ***** *********** or ******* *******. ****** other ***** ** ********** access *******, *********** ******* only **** **** * specific **** ** **** and ****** ** ******* to ******** *****.

Protecting ******* ********** ******

* ****** ******** **** arises **** *********** ******* is "*** **** *** door **** **** ** deny ** ****?"

***** * ****** *****-**/*****-*** interval, **** ****** ** determined ** *** '***** date *****' ** ****** encoded ** *** ****. When *** ***** *** date ** *******, *** encoded **** ** *** card ** **** ** 'invalid' ****** * ******* point. *******, *** ******* situations, **** ********** ***** check-outs ** ******** *****, employee ***** **** * vital ****. ** *********** for ***** **********, ** is * ****** *********** that ***** *** *** housekeeping ***** *** '*********' every ***, *** *** 'internal' ***** ** * hotel **** **** *** updated ***** **** *** housekeeping ***** ****** ***** cards ***** ****** ***** rounds.

************, ******** ***** *** not *********** ** *** same ****** ***** ** guest *****, *** *** be ********** *** ********** access. *******, * ****** feature ** ***** ***** is *** '********** ********' deadbolt **** ******** *** external **** ****** **** thrown. *** ***** *************, it ** ****** ** see * **********, ***** door **** ** *** lever **** ****** ****** in ** *********.

Advantages ** *********** *******

*** **** ******* ************** of ***** ****** *******, compared ** **********, ** they *** *********** ** purchase, ********, *** *******.

******* *** ****** '**** tech' ********** ***** ******* give ******, *********** * new **** *** ******* it ** * ***** is **** ****** *** inexperienced ****** ** ******, and ******* ** ***** disposable ****** *** ****** be ****** **** ****** than ******* '*** **********' like *********** *******.

***** ********** *******:

  • ******* ********** ***** ** program
  • **** ** ********** ***** by ************* ****
  • *** ** ********** '****** off' ** ******** ********** deadbolt **** ****** ****
  • ********** ******** **** ***** emergency ****** ** *** times
  • *********, **** ******** **** up ** *** - 500 ****** ******** *** forensic ************** ** ******

Disadvantages ** ***** ** ********** ****** *******

*******, *********** ********** ****** has *** ******** *** access ********** *** **** security **** ***** ******* generally ***'*:

  • *********** ************** ** ********* support
  • ******* ** ******* ******** access ********* *** ****** locations
  • *********** *** ** *********** revoked ** '***********'
  • ***** *** *********** ** 'locked ****'
  • *********** *** **** ** a ****-********* ***** *** carry ******** ***********
  • ******** ** *** ********* powered ** ******* ***** and ** **** ******** and ******* ** ********
  • **** ********* ** *** events ****** ** ***********

Hotel ******* *** ****** ****** ********

***** ****** ******* ** not * ****** ******* typically ******** ** *** security **********.

***** ********** *****, ******* profits *** **** *********** usually ****** ** ***** systems ***** ********* **-***** by ***** *********** *****.

** *******, *** ******** approach ** *********** '*********' access ******* ** **** as '********' *** ******* compared ** *** *** cost, *******-***** ************ ***** in *** *********** ******.

*********** ****** ************* **** and ******* ***** *** products, ***** ********* *** traditional ********** *******. **** business ***** ** ********* for ******* *******:

  • ******* *** **** ***, typically ******* *** ****** threshold ** ********** **** pursue.
  • ** *** **** **** of *** ****, *** manufacturer ** **** ** control *******. ***** ******* depend ** *** '***' of *********** ******* ******, and ** * ****** they **** *** **** hardware *** ************ ***** near ****.
  • *********** ****** ********* ***** 'keycard *******' ** '****** items', *** ***** ****** buy *********** ******** (*****, battery *****) **** ********** pricing ******** **** *********** supply ************, ****** **** security ***********.

Hotel ****** ******** ********

******* ****** ********* **** magnified *** ***** ** hotel ****** ******* ******** to ********** ******. **** this *******, ***** * careless ** ******** ***** encoded ***** ***** **** with * '****** ***' function, *********** ******** * single ***** ** **** every ****:

*** **** ********* ** this ******** *** ** avoided, *** *** ********** mitigated **** ***** ****** systems. **** * ***** networked ********** ****** ******, such ** ***** ***** immediately ** ********* ** made, *** *** **** lock ****** ********** ** simply *** **** ** remain ****** ** ******* users ***** *** ******* is *********.

[**** ******* *** ********** released ** **** *** substantially ****** ** *** end ** **** ** reflect ******** ** ***** access ******* **********.]

Comments (4)

* ********** ****** *** a ******* *** ***** chain. * ******'* **** hotel ****** ******* ** my ***** *****, ** specific ******. **'* ********* right *** ** *** Soviet-era... ************ ******** "***" software ***** ******** * medical ****** ** **********. It *** ****** **** bugs *** ***** ***** seem ** **** **** correctly.

*** ***** ******? ***** door **** *** ******* controlled (****** *'* *******). Some ***** ***** **** months ******* * ******, other ****** *** ********* every *** ****. ** course, ** **** ******** this ***** ****** ***+ doors *** ************** ** the ******* ******* ** a ***** *********** *****.

** ***** ******* *** have ********** *********, *** are ***** *** *********?

** *******, ***** ***** are *** ** * phone *** *** ** each ***** ** ** a ***** ******.

********* ******* - ******. Any **** * ***** rep **** ******* ** can ****/******* *****/*********** ****** control, * ******** ****** harm. **** ***** ** convey ** ********** ** the ***** ;-)

Read this IPVM report for free.

This article is part of IPVM's 6,807 reports, 913 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports