Mobile Access Control Guide

By: Brian Rhodes, Published on Aug 28, 2019

One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this work?

Based on our mobile access control shootout, in this guide, we examine:

  • BLE vs NFC vs Apps comparison
  • Why many access systems use multiple methods
  • Mobile pricing compared
  • Mobile access OEMs are common
  • Limited reader model selection typical

Plus we detail factors that may limit mobile's appeal for some users:

  • Cards & Fobs Are Inexpensive
  • 'Bring Your Own Device' (BYOD) Can Be Awkward
  • Ongoing Service Billing
  • Awkward or No Picture IDs
  • Battery Power Limitations

*** ** *** ******* trends ** ****** *** the **** *** ***** has **** *** ******** of ****** ****** *** access *****. *** *** does **** ****?

***** ***** ****** ****** ******* shootout, ** **** *****, we *******:

  • *** ** *** ** Apps **********
  • *** **** ****** ******* use ******** *******
  • ****** ******* ********
  • ****** ****** **** *** common
  • ******* ****** ***** ********* typical

**** ** ****** ******* that *** ***** ******'* appeal *** **** *****:

  • ***** & **** *** Inexpensive
  • '***** **** *** ******' (BYOD) *** ** *******
  • ******* ******* *******
  • ******* ** ** ******* IDs
  • ******* ***** ***********

[***************]

Mobile *********** ***********

***** ****** ******* ** credentials ** **** ***** has * *** **** factor.

** **** *****, *** phone *** *** **** to ** ******** ** app ********* ** ***** to **** * ****, with **** ***** ********* or ***** ******** ***** enough ** **** ******* user ********** ****.

******* ** ******** * card, ***, ***, ** fingerprint ** * ******, a **** ******* * phone ** ********* ** app *** *** **** is ********.

***** ** *** ****** personal ***** ** ******, the **** **** **** accompany ***** **** ****, wallets, ** ** ***** and **** *** *** easily **** ** ********* make **** **** ********* card ************.

Three ***** ****** *******

** ***** ** *******, three ****** ******* ** mobile *********** *** **** in ******:

  • *** (********* *** ******)
  • *** (**** ***** *************)
  • *** ***** ***********

Mobile ********** ****** **********

************ ***** ****** ** used ***** * *** difference *** ******* ****** access ***********. ** *******, access ************ **** ****** will ****** *****/*** **** methods *** ********* **** their *******, **** **** method ****** ********* *********** and ********.

*** ********* ***** ***** the ***** *********** ******* types:

*** *******, ****** *** difference ** ***** ******* the ***** *******. ***** NFC ***** ** ***** (typically **** **** * inches), *** ***** *** BLE ** ****** ** ~150 ****, ***** *** systems *********** **** ****** only ******* ** **-** and ******** ************.

** ***** *****, ***** method ** **** ******* reliability ***. *** *******, with *** ******, ***** BLE ** **** ******** for ********** ** *** reader **** ***, *** because ********* ***** ***** may ***** ***** ****** is ******* ****, ******* user ********** ** ***** determined ** ***** ****** access ****** **** ***.

Many ****** ******* *** ******** *******

** ***** ** ******** the ******** ** * particular ******, **** ****** access ******* *********** ******** mobile ******* ** ***** systems.

*** *******,*** ********** **** *** ** NFC, ***************** *** *****. *** available ******* ****** ** how ****** ** ********** into *** ****** ********, as ** *** **** with****** ********************* (***) ***** **. ****** **** *** the **** ********** *******, PDK ********** ***** *** and *** **. *** only *** *** ****** version.

***** *** ** *** readers **** ******* **** credentials, **** ******* *********** directly **** ******* **********,** *** **-** ** communicate ** *** ******.

BLE (********* *** ******)

*** ** *** **** common ****** ****** ****** method, ******** ** ****** all ****** ****** *** mobile ****** ********.

* *** ******* ** that *** ********* ***** are **** ** *** cost ******** ** ***, and ************* ****** ****** money ** ******* *** compliant **** ********** ** volumes ****.

** ***** ** **********, BLE ******** ****** ***** to ********, ** **** phone ********* *** * showstopper *** ***** ******* backup ********** ******* **** cards, ****, ** **** to ** ****.

*** *** ****** *** most ****** ****** ** remote *************, ***** ******** engineering ********* ********** *** low/no *** ********* *****. Many ********-***** ******** **********,****, *** ***** ********** use *** ** ******* credentials.

NFC (**** ***** *************)

*** ********* ** ****** is *****, **** ******* phones ******** ******** ***************, but *****/******* ***** **************** ******* **** *** **** with ****** ******.

** ***** ** *********, NFC ********* *** ********** of ***** ***** ** use * **********. **** an *** **** *** been ******* ** ** access **********, ** *** be **** ** * passive **** *** ***** energized ** *******, * feature ******* *** ** Apps *****.

***** ****** ******* *** US *** ************ **** banking, ******* *****, *** mass *******, *** *** is ***** ********** ****** the ** *** ********* BLE ** **** ****** used.

App *****

* *****, *** **** common, ****** **** ** app ** ******* * door ****** ********.

*** *** ****** ***** was **** ** ******* consumer-grade ********* *************, *** *** ******** into ********** ********* *********,********* ****,****,********,*****, *** ******.

*** ***** ** ***** shows * '*** **** to ******' ****** ********* as ********** **** ********* ******:

***** **** ******, ****** use **-** ** *********** with ******* ** ******** interface **** ********* **** controllers.

**** ********* *** ******* customer ******** ** ***** remote ****** *** *** or ******* *********, ***. to **** ***********.

Pricing *** ****** ****** *******

*** **** ** ****** mobile ** ***** ****** typically ******** ***** ******* (often ********* ***** ****) and * ******** / licensing ****.

******* *** ******* ********* range ~$*** - $*** each.

******** / ********* **** ranges *************:

  • *** **** ******** ******* fee: **** ** ********* the ***** ********* ******* typical ****** **** ******* like ********* **** *** Nortek ********* ******** ***** $10 *** ******, *** time ****.
  • ******* ******** ******* *** per ******: ******** *** Proxy ****** * ******* fee *** ****** ** $20. ***** * ****** ratio ** ** ******* (or ****) *** ******, this ** ** ********* cost ** * *** dollars *** ***** *** device.
  • ******* ******** ******* *** per ******: **** ** typically *** **** ********* overall ****** **** ******* like *** *** ***** generally ******** $* ** more *** ****** *** month.

** *** **** *** of ****** *********, **** $70+ ** **** *** year *** ******, ********** costs *** ******** *** or **** ******** ** conventional ******** *********** **** range **** $* ** $8 **** ***, ** average, **** ** ***** a ****, ** *** multiple *****.

Mobile ****** **** ******

***** ****** ******* ******* use ******* *******/***'* ********* for ***** ****** ****** offerings.

*** *******, *** ****** brands ***** *** ***** suppliers:

**** ******** ********** ****** brands ****, ***** *** their ****** **** ***** vendors, *** ***** ******** a ****** ****** *** may **** ***** ** licensing *** ***********, *** technical ***********.

Limited ****** ***** *********

** ******* ********** ** mobile ****** ** **** only * *** ******* are **********, ***** *** limit ********* *** **** how *** ****** ** connected ** * **** controller *** ******* ** OSDP.

*** ********** ***** ***** from *** ******** ***** the ********* ** ******** reader ****, *** ****** application ***** **** ******* mounts *** *** ** possible ***** ** ***** product ** ****:

** **** *****, **** with*** ******, * ****** ** form ******, **** ********** format *******, *** ******* vs. **** ********** ******* are ********* ******* *** entire *** ** ****** line ** ****** **********.

*******, ******* *** ************* limited **** * ****** like****** **** ******** **** *** ****, 125 *** *** *******-**** model *********.

Management & ***** ********* ********

************* *** ******** ****** access ** *** ****** for ********** ****** *******.

* ***** ** ********** and ****** ******* ********** issues **** ** **** are *** ********* ******* with *********** ********** *******. These *******:

  • ***** & **** *** Inexpensive
  • '***** **** *** ******' (BYOD) *** ** *******
  • ******* ******* *******
  • ******* ** ** ******* IDs
  • ******* ***** ***********

Cards & **** *** ***********

****** ******, **** *********** ones, *** ******* *** - *** *** **** of * ****. *** the **** ** *********** a ***** ** **** higher, ********* ******** ********* and ******** ******* ***** a **** ******* **** inexpensive *** *********** **** to ******** **** ******.

** * **** ****** or ** ****, *** employer ******** * $** piece ** *******, ***** if * ***** ****** or ** ****, ******* must *** ******** ** dollars ** ******* **.

'Bring **** *** ******' (****) *** ** *******

** **** *****, ********* will *** ** ****** employee ******. *********, '***** Your *** ******', ** asking ***** ** ******** their ******** ****** *** commercial **** ******** ******** problems.

****** *** ***** **** how ********** ******* ******** is **********, ** ******* or *** ***** ****** are ******* ** ****** employer ************ *** ******* management ********* ** ******** devices.

Ongoing ******* *******

******* *********** ***** ** what ******* ** *** phone **** ** ******?

** ******* ************* ****** the ************** ** *********, even ** **** ****** enter **** ********* ** a ******? ** **** employers ****** *******?

****** ***, *** ******** leaves * *** ****** to ** *********** *** otherwise ****** ** ****** credentials *** *** ****.

Awkward ** ** ******* ***

****** ******** ***** **** are ***** ******* **** the ****'* *******, ****, and ***** ******** ******* like ** ***** ** magstripes, ***** *** ****** or ******** **** ***** with ******.

******* *** *** * factor ** ******** ************ for ***** ******** *****, where ** * ****** others *** ***** *** picture ** * **** to *** ****** ********** it *** ******.

************* *** ****** ****** this ** **** ********* by ********* ******, ***** require ***** ** **** other ******** ** ***** proof *** ***** **** is ******.

******** **** ****** ******** or ********* ********* *** phones *** ** ******** for ****** *****, *** while ******** ** *********, overall ********** *** **** to ****** *** ***** may ******** **** ** the '****** ******' *****.

Battery ***** ***********

**** ******** ** ***** as ******* **** *** issues **** ******, *** their ******* ** ******** credentials ******** ** ********* credential **** ** *****:

******, ******* *****, ********* condition, ******** ********, *** even *****-******* ******* *** mitigated ****** **** *****.

Mobile ****** ********

*** * ******** **** at **** ** *** leading ****** ****** *********, see ********* ****** ******* ************* ** ******* *** key ********* *** ********** of ****.

***** **** ******* ** each ** ***** ********* in *** ****** ****** test ******:

Comments (19)

************* ***, (** * commercial *******)?

**!

***** *** ******* *'** seen *** ****** ** an **********, *** **** are *** **** ****** these ****. * *** not *** *** ******** at *** ** *******.

* ***'* ***** *** will **** *** ******* for ***** ***** ** phone *****, ******. ***'** need ** *** *** mobile *** *****. ******* I've **** *** *** or ****** ******** ** Alibaba ** ****.

*** ** *** ****** of ****** ****** ************ for ******? ** *** my ************* ** ** more ******* **** ****** than **** *** ********** (I ***** ******** *** Salto **** ******* ****** technologies). ** *** **** any **** *** **** may ** *** ****?

* ******* ****** ** indeed ******** *** ****** in *********** *******, ********** for ******-*** **********.

******* *********** ******* ******** lots *** **** ** credentials, ******** ** * single ***** ****, (**** just **** ** *****) the ********* ******* ** these ****** *** **** quite ***** - **** is *** ***'** ***** see *********** ******* ** them, ** **** ****** or ********* *** **** of *** ****.

*** ** ** **** colleagues **** ** ** a ****** **** ***** mobile *********** ******* **** used. *** ****** ******* of *****-**, **** ******, and *****-*** *** **** via *** ***.

****** ****** *** ********* advantages ** *********** ** app ** ****** ****** (marketing '***' ** '*******' deals, ******** ******* ******, etc), **** ********* *** 'cool ******' ** ****** with ***** ******** *********, and ****** *********/********** ** many ******.

*** *** ******* **** mobile ***** *********** ************* expire **** *** ***** guest ***** *** **** arrives **** ** **** cards?

********, ** *** ** these *** ******* ******* a ******** ******** ****?

*** **** *** ******** potentially **** ******?

**'* ** *********** ****. None ** *** ******* we've ****** ******* * feature **** ****.

*’* ******* *** ** idea **** ***** **** quite ********* ** * person ******** ** * reader **** * **** phone :)

**'** **** * *** products ***** ***** ***** can ** *********** ** a **** **** *** 'solar/light' *****:

*** **** ** ** the **** ******* ** dead, ***** *** **** on *** *** ********** on ***** ****** *** charge ** *** **** enough ** *** ******.

** ******, ** *****'* tested ****, *** *** idea ** *** ******** in ********** ******** ** have ****.

** ** *** ****** MiFare ** * *****?

** ** *** ***’* legacy ****** **** ******* read *** ******?

** ** *** ****** MiFare ** * *****?

**. **** *********, *** NFC ** * ******** transmission ****** *** *** own.

***** *** *********** *** the ****, * ****** if * ****** ****** would ***** *** *** chip ** * **** smartphone ******* ***** ******. though * ******* ** wouldn’t ******* ** ** wouldn’t ********** *** *******.

**** ** *** **** of ********** ****** ******* **** NFC/Mifare ************* ** **** sort:

**'* ***********. **************** ******(**** ***** ***) ******** his *** **** ** emulate ****** ** *******, apparently ************* ** *** system, *** ** ***** it '* **** *** * half' **** ********** ******** a ***** **** *** modification ** ***'* ********* file:

*******, ** *** *** the ******** *** * hack *** * ****. Only ******* **** *** NFC *********** ***** **** be ******** **. *******, I *** ** ****** the **********.*** (******* *** file ****** ** **) system **** *** ******* the ********* ** *** application. **** ***** **********, enable ****** *********. **** using * ****** ******/****** (hid *****), * ****** the **** (******* *** blocks, ** ** **** sector *) **** *** phone.In *******, * ***** *** ***** ** * ****** ** ****. **** **, * ****** ** ** **** ** *** *****. *** ***'* **************** *** ****.

** *** ***, *** poster ****** '******** * proved ** ********, ** is *** ******** *** production.' ***********, * ****** ** was ***** ****** ******* (the ****** ** *** list *** ******) ** DESFire ***; ***** *** 'cracked' ******* *** *** DESFire ***. [****: *** is ******** **** ** a *** **** ** still ********* *** ******, with '******' ****.]

* ** *** ******** enough **** *** ********* barriers ** ******* ** whether ** *** ***-*** readers *** **** ******** MIFARE ** ******* ******* without ********.

*** ***** « ***********, I ****** ** *** using ****** ******* (*** format ** *** **** you ******) ** ******* EV1; ***** *** '*******' formats *** *** ******* EV2 »

****** ******* *** ******** cracked *** ******* *** was ***** *******, ** my *********. ****** ******* more *********** ** *** have ** (******* *** is *** *** **** thing ** ****** *******, which *** *******)

**, ****'* * **** catch. *** ** **** crackable **** *** ****** key ** ***** (** if *** ******* *** is ****, ***** ***** it ********** *** **** as '*******').

*** ********* *** ***** sniffers ****** ****** ***** keys, *** *** ***** must ********* ** ********. If **** ***** ** known, **** *** ****** can ** **********.

** ** ** ************* that *** ****** ****** keys ** ** ****.

** **** ***** ** a **** ***. ******* EV1 *** *** **** been ******* **** ******** as ***********.

********** ******* ********** (***) offers * ********** ******* based ** **** **** offering *** (*** *******) BLE (*** *** ** Apple ************), ****/******** ****** the *** ****** *** "shake ** ******". **'* reader ****** *** *** items *** **** **** as **** ** ***** 125k ** ****** **********.

****** ****** *** ** limited ** ******** ********* (e.g. *********, ***** *******) and ************

*. **** *** ****** access ** *** **** whom *** *** ********** visiting *** ****** ** often ** ********** ******** office *********.

*. *** ** **** for ********* **** *** barrier **** ** *** long **** *****, *********** to ****

* ********** *** **** little "*****" **** *** mobile *** ****** *** on * ********'* ****.**** all *** ********* ********** on ******* ** ****** pretty **** **** *** blueetoth *** *** ********* so **** *** ****** was ******* ****** *** reader's **** (*.*. **** they **** *** *** a ***** ) ** was *********** *********** ** the ******.***** ** ******* in *** *** *** you *** *** ********* output *********** (*** ** you ***** **** *****) Apple *****'* ***** *** parties ** *** ***** telephone ******** (*** ********** power *** ** ******* mode) *** ***** *** nothing ** ** ****** to **** ***** **** to ** ******** ** their ***** ** ** go **** **** **** plattform

Read this IPVM report for free.

This article is part of IPVM's 6,307 reports, 842 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

New: Mobile Access Proxy Releases 'World's Smallest Mobile Reader' on Mar 04, 2020
Mobile access provider Proxy claims its new Nano is 'the world’s smallest mobile reader' that can be installed into nearly all existing access...
Access Credential Form Factor Tutorial on Feb 10, 2020
Deciding which access control credential to use and distribute, including form factor, can be a difficult task. Knowing the limitations and...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...

Most Recent Industry Reports

JCI / Tyco Security Products Layoffs on Jun 05, 2020
Johnson Controls / Tyco Security Products has confirmed COVID-19 related layoffs, expanding upon the April coronavirus cuts the company previously...
EyePark Presents Mobile Driver Authentication on Jun 05, 2020
EyePark presented its long-range QR code parking verification platform at the May 2020 IPVM Startups show. A 30-minute video from EyePark...
Bleenco "Under The Tongue" Temperature Detection Examined on Jun 05, 2020
"Say aah", says Bleenco, a PPE detection video analytics company, offering a different method for measuring body temperature with a thermal...
Hikvision and Uniview Entry Level Thermal Handheld Cameras Tested on Jun 05, 2020
While most screening systems cost $10,000 or more, manufacturers such as Hikvision and Uniview have now released handheld models for $1,000 or...
Sequr Presents HID based Cloud Access Control on Jun 04, 2020
Sequr presented HID based Cloud Access Control at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Sequr...
VergeSense Presents People Tracking Sensor on Jun 04, 2020
VergeSense presented its people tracking sensor and social distancing insights at the May 2020 IPVM Startups show. A 30-minute video from...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative. While rivals have marketed fever detection, FLIR has stuck to EST...
"Fever Camera" Show On-Demand Watch Now on Jun 03, 2020
IPVM has successfully completed the world's first "Fever Camera" show. Recordings from both days are posted at the end of this report for on-demand...
Cobalt Robotics Presents Indoor Security and Access Robots on Jun 03, 2020
Cobalt Robotics presented indoor security robots at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Cobalt...
Dahua Sues Ex-North American President, Says Legal Typo on Jun 03, 2020
Dahua's former North American President Frank Zhang claims he is owed almost $11 million but Dahua counter claims it is just a "scrivener's error",...