Mobile Access Control Guide

By: Brian Rhodes, Published on Aug 28, 2019

One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this work?

Based on our mobile access control shootout, in this guide, we examine:

  • BLE vs NFC vs Apps comparison
  • Why many access systems use multiple methods
  • Mobile pricing compared
  • Mobile access OEMs are common
  • Limited reader model selection typical

Plus we detail factors that may limit mobile's appeal for some users:

  • Cards & Fobs Are Inexpensive
  • 'Bring Your Own Device' (BYOD) Can Be Awkward
  • Ongoing Service Billing
  • Awkward or No Picture IDs
  • Battery Power Limitations

*** ** *** ******* trends ** ****** *** the **** *** ***** has **** *** ******** of ****** ****** *** access *****. *** *** does **** ****?

***** ***** ****** ****** ******* shootout, ** **** *****, we *******:

  • *** ** *** ** Apps **********
  • *** **** ****** ******* use ******** *******
  • ****** ******* ********
  • ****** ****** **** *** common
  • ******* ****** ***** ********* typical

**** ** ****** ******* that *** ***** ******'* appeal *** **** *****:

  • ***** & **** *** Inexpensive
  • '***** **** *** ******' (BYOD) *** ** *******
  • ******* ******* *******
  • ******* ** ** ******* IDs
  • ******* ***** ***********

[***************]

Mobile *********** ***********

***** ****** ******* ** credentials ** **** ***** has * *** **** factor.

** **** *****, *** phone *** *** **** to ** ******** ** app ********* ** ***** to **** * ****, with **** ***** ********* or ***** ******** ***** enough ** **** ******* user ********** ****.

******* ** ******** * card, ***, ***, ** fingerprint ** * ******, a **** ******* * phone ** ********* ** app *** *** **** is ********.

***** ** *** ****** personal ***** ** ******, the **** **** **** accompany ***** **** ****, wallets, ** ** ***** and **** *** *** easily **** ** ********* make **** **** ********* card ************.

Three ***** ****** *******

** ***** ** *******, three ****** ******* ** mobile *********** *** **** in ******:

  • *** (********* *** ******)
  • *** (**** ***** *************)
  • *** ***** ***********

Mobile ********** ****** **********

************ ***** ****** ** used ***** * *** difference *** ******* ****** access ***********. ** *******, access ************ **** ****** will ****** *****/*** **** methods *** ********* **** their *******, **** **** method ****** ********* *********** and ********.

*** ********* ***** ***** the ***** *********** ******* types:

*** *******, ****** *** difference ** ***** ******* the ***** *******. ***** NFC ***** ** ***** (typically **** **** * inches), *** ***** *** BLE ** ****** ** ~150 ****, ***** *** systems *********** **** ****** only ******* ** **-** and ******** ************.

** ***** *****, ***** method ** **** ******* reliability ***. *** *******, with *** ******, ***** BLE ** **** ******** for ********** ** *** reader **** ***, *** because ********* ***** ***** may ***** ***** ****** is ******* ****, ******* user ********** ** ***** determined ** ***** ****** access ****** **** ***.

Many ****** ******* *** ******** *******

** ***** ** ******** the ******** ** * particular ******, **** ****** access ******* *********** ******** mobile ******* ** ***** systems.

*** *******,*** ********** **** *** ** NFC, ***************** *** *****. *** available ******* ****** ** how ****** ** ********** into *** ****** ********, as ** *** **** with****** ********************* (***) ***** **. ****** **** *** the **** ********** *******, PDK ********** ***** *** and *** **. *** only *** *** ****** version.

***** *** ** *** readers **** ******* **** credentials, **** ******* *********** directly **** ******* **********,** *** **-** ** communicate ** *** ******.

BLE (********* *** ******)

*** ** *** **** common ****** ****** ****** method, ******** ** ****** all ****** ****** *** mobile ****** ********.

* *** ******* ** that *** ********* ***** are **** ** *** cost ******** ** ***, and ************* ****** ****** money ** ******* *** compliant **** ********** ** volumes ****.

** ***** ** **********, BLE ******** ****** ***** to ********, ** **** phone ********* *** * showstopper *** ***** ******* backup ********** ******* **** cards, ****, ** **** to ** ****.

*** *** ****** *** most ****** ****** ** remote *************, ***** ******** engineering ********* ********** *** low/no *** ********* *****. Many ********-***** ******** **********,****, *** ***** ********** use *** ** ******* credentials.

NFC (**** ***** *************)

*** ********* ** ****** is *****, **** ******* phones ******** ******** ***************, but *****/******* ***** **************** ******* **** *** **** with ****** ******.

** ***** ** *********, NFC ********* *** ********** of ***** ***** ** use * **********. **** an *** **** *** been ******* ** ** access **********, ** *** be **** ** * passive **** *** ***** energized ** *******, * feature ******* *** ** Apps *****.

***** ****** ******* *** US *** ************ **** banking, ******* *****, *** mass *******, *** *** is ***** ********** ****** the ** *** ********* BLE ** **** ****** used.

App *****

* *****, *** **** common, ****** **** ** app ** ******* * door ****** ********.

*** *** ****** ***** was **** ** ******* consumer-grade ********* *************, *** *** ******** into ********** ********* *********,********* ****,****,********,*****, *** ******.

*** ***** ** ***** shows * '*** **** to ******' ****** ********* as ********** **** ********* ******:

***** **** ******, ****** use **-** ** *********** with ******* ** ******** interface **** ********* **** controllers.

**** ********* *** ******* customer ******** ** ***** remote ****** *** *** or ******* *********, ***. to **** ***********.

Pricing *** ****** ****** *******

*** **** ** ****** mobile ** ***** ****** typically ******** ***** ******* (often ********* ***** ****) and * ******** / licensing ****.

******* *** ******* ********* range ~$*** - $*** each.

******** / ********* **** ranges *************:

  • *** **** ******** ******* fee: **** ** ********* the ***** ********* ******* typical ****** **** ******* like ********* **** *** Nortek ********* ******** ***** $10 *** ******, *** time ****.
  • ******* ******** ******* *** per ******: ******** *** Proxy ****** * ******* fee *** ****** ** $20. ***** * ****** ratio ** ** ******* (or ****) *** ******, this ** ** ********* cost ** * *** dollars *** ***** *** device.
  • ******* ******** ******* *** per ******: **** ** typically *** **** ********* overall ****** **** ******* like *** *** ***** generally ******** $* ** more *** ****** *** month.

** *** **** *** of ****** *********, **** $70+ ** **** *** year *** ******, ********** costs *** ******** *** or **** ******** ** conventional ******** *********** **** range **** $* ** $8 **** ***, ** average, **** ** ***** a ****, ** *** multiple *****.

Mobile ****** **** ******

***** ****** ******* ******* use ******* *******/***'* ********* for ***** ****** ****** offerings.

*** *******, *** ****** brands ***** *** ***** suppliers:

**** ******** ********** ****** brands ****, ***** *** their ****** **** ***** vendors, *** ***** ******** a ****** ****** *** may **** ***** ** licensing *** ***********, *** technical ***********.

Limited ****** ***** *********

** ******* ********** ** mobile ****** ** **** only * *** ******* are **********, ***** *** limit ********* *** **** how *** ****** ** connected ** * **** controller *** ******* ** OSDP.

*** ********** ***** ***** from *** ******** ***** the ********* ** ******** reader ****, *** ****** application ***** **** ******* mounts *** *** ** possible ***** ** ***** product ** ****:

** **** *****, **** with*** ******, * ****** ** form ******, **** ********** format *******, *** ******* vs. **** ********** ******* are ********* ******* *** entire *** ** ****** line ** ****** **********.

*******, ******* *** ************* limited **** * ****** like****** **** ******** **** *** ****, 125 *** *** *******-**** model *********.

Management & ***** ********* ********

************* *** ******** ****** access ** *** ****** for ********** ****** *******.

* ***** ** ********** and ****** ******* ********** issues **** ** **** are *** ********* ******* with *********** ********** *******. These *******:

  • ***** & **** *** Inexpensive
  • '***** **** *** ******' (BYOD) *** ** *******
  • ******* ******* *******
  • ******* ** ** ******* IDs
  • ******* ***** ***********

Cards & **** *** ***********

****** ******, **** *********** ones, *** ******* *** - *** *** **** of * ****. *** the **** ** *********** a ***** ** **** higher, ********* ******** ********* and ******** ******* ***** a **** ******* **** inexpensive *** *********** **** to ******** **** ******.

** * **** ****** or ** ****, *** employer ******** * $** piece ** *******, ***** if * ***** ****** or ** ****, ******* must *** ******** ** dollars ** ******* **.

'Bring **** *** ******' (****) *** ** *******

** **** *****, ********* will *** ** ****** employee ******. *********, '***** Your *** ******', ** asking ***** ** ******** their ******** ****** *** commercial **** ******** ******** problems.

****** *** ***** **** how ********** ******* ******** is **********, ** ******* or *** ***** ****** are ******* ** ****** employer ************ *** ******* management ********* ** ******** devices.

Ongoing ******* *******

******* *********** ***** ** what ******* ** *** phone **** ** ******?

** ******* ************* ****** the ************** ** *********, even ** **** ****** enter **** ********* ** a ******? ** **** employers ****** *******?

****** ***, *** ******** leaves * *** ****** to ** *********** *** otherwise ****** ** ****** credentials *** *** ****.

Awkward ** ** ******* ***

****** ******** ***** **** are ***** ******* **** the ****'* *******, ****, and ***** ******** ******* like ** ***** ** magstripes, ***** *** ****** or ******** **** ***** with ******.

******* *** *** * factor ** ******** ************ for ***** ******** *****, where ** * ****** others *** ***** *** picture ** * **** to *** ****** ********** it *** ******.

************* *** ****** ****** this ** **** ********* by ********* ******, ***** require ***** ** **** other ******** ** ***** proof *** ***** **** is ******.

******** **** ****** ******** or ********* ********* *** phones *** ** ******** for ****** *****, *** while ******** ** *********, overall ********** *** **** to ****** *** ***** may ******** **** ** the '****** ******' *****.

Battery ***** ***********

**** ******** ** ***** as ******* **** *** issues **** ******, *** their ******* ** ******** credentials ******** ** ********* credential **** ** *****:

******, ******* *****, ********* condition, ******** ********, *** even *****-******* ******* *** mitigated ****** **** *****.

Mobile ****** ********

*** * ******** **** at **** ** *** leading ****** ****** *********, see ********* ****** ******* ************* ** ******* *** key ********* *** ********** of ****.

***** **** ******* ** each ** ***** ********* in *** ****** ****** test ******:

Comments (19)

************* ***, (** * commercial *******)?

**!

***** *** ******* *'** seen *** ****** ** an **********, *** **** are *** **** ****** these ****. * *** not *** *** ******** at *** ** *******.

* ***'* ***** *** will **** *** ******* for ***** ***** ** phone *****, ******. ***'** need ** *** *** mobile *** *****. ******* I've **** *** *** or ****** ******** ** Alibaba ** ****.

*** ** *** ****** of ****** ****** ************ for ******? ** *** my ************* ** ** more ******* **** ****** than **** *** ********** (I ***** ******** *** Salto **** ******* ****** technologies). ** *** **** any **** *** **** may ** *** ****?

* ******* ****** ** indeed ******** *** ****** in *********** *******, ********** for ******-*** **********.

******* *********** ******* ******** lots *** **** ** credentials, ******** ** * single ***** ****, (**** just **** ** *****) the ********* ******* ** these ****** *** **** quite ***** - **** is *** ***'** ***** see *********** ******* ** them, ** **** ****** or ********* *** **** of *** ****.

*** ** ** **** colleagues **** ** ** a ****** **** ***** mobile *********** ******* **** used. *** ****** ******* of *****-**, **** ******, and *****-*** *** **** via *** ***.

****** ****** *** ********* advantages ** *********** ** app ** ****** ****** (marketing '***' ** '*******' deals, ******** ******* ******, etc), **** ********* *** 'cool ******' ** ****** with ***** ******** *********, and ****** *********/********** ** many ******.

*** *** ******* **** mobile ***** *********** ************* expire **** *** ***** guest ***** *** **** arrives **** ** **** cards?

********, ** *** ** these *** ******* ******* a ******** ******** ****?

*** **** *** ******** potentially **** ******?

**'* ** *********** ****. None ** *** ******* we've ****** ******* * feature **** ****.

*’* ******* *** ** idea **** ***** **** quite ********* ** * person ******** ** * reader **** * **** phone :)

**'** **** * *** products ***** ***** ***** can ** *********** ** a **** **** *** 'solar/light' *****:

*** **** ** ** the **** ******* ** dead, ***** *** **** on *** *** ********** on ***** ****** *** charge ** *** **** enough ** *** ******.

** ******, ** *****'* tested ****, *** *** idea ** *** ******** in ********** ******** ** have ****.

** ** *** ****** MiFare ** * *****?

** ** *** ***’* legacy ****** **** ******* read *** ******?

** ** *** ****** MiFare ** * *****?

**. **** *********, *** NFC ** * ******** transmission ****** *** *** own.

***** *** *********** *** the ****, * ****** if * ****** ****** would ***** *** *** chip ** * **** smartphone ******* ***** ******. though * ******* ** wouldn’t ******* ** ** wouldn’t ********** *** *******.

**** ** *** **** of ********** ****** ******* **** NFC/Mifare ************* ** **** sort:

**'* ***********. **************** ******(**** ***** ***) ******** his *** **** ** emulate ****** ** *******, apparently ************* ** *** system, *** ** ***** it '* **** *** * half' **** ********** ******** a ***** **** *** modification ** ***'* ********* file:

*******, ** *** *** the ******** *** * hack *** * ****. Only ******* **** *** NFC *********** ***** **** be ******** **. *******, I *** ** ****** the **********.*** (******* *** file ****** ** **) system **** *** ******* the ********* ** *** application. **** ***** **********, enable ****** *********. **** using * ****** ******/****** (hid *****), * ****** the **** (******* *** blocks, ** ** **** sector *) **** *** phone.In *******, * ***** *** ***** ** * ****** ** ****. **** **, * ****** ** ** **** ** *** *****. *** ***'* **************** *** ****.

** *** ***, *** poster ****** '******** * proved ** ********, ** is *** ******** *** production.' ***********, * ****** ** was ***** ****** ******* (the ****** ** *** list *** ******) ** DESFire ***; ***** *** 'cracked' ******* *** *** DESFire ***. [****: *** is ******** **** ** a *** **** ** still ********* *** ******, with '******' ****.]

* ** *** ******** enough **** *** ********* barriers ** ******* ** whether ** *** ***-*** readers *** **** ******** MIFARE ** ******* ******* without ********.

*** ***** « ***********, I ****** ** *** using ****** ******* (*** format ** *** **** you ******) ** ******* EV1; ***** *** '*******' formats *** *** ******* EV2 »

****** ******* *** ******** cracked *** ******* *** was ***** *******, ** my *********. ****** ******* more *********** ** *** have ** (******* *** is *** *** **** thing ** ****** *******, which *** *******)

**, ****'* * **** catch. *** ** **** crackable **** *** ****** key ** ***** (** if *** ******* *** is ****, ***** ***** it ********** *** **** as '*******').

*** ********* *** ***** sniffers ****** ****** ***** keys, *** *** ***** must ********* ** ********. If **** ***** ** known, **** *** ****** can ** **********.

** ** ** ************* that *** ****** ****** keys ** ** ****.

** **** ***** ** a **** ***. ******* EV1 *** *** **** been ******* **** ******** as ***********.

********** ******* ********** (***) offers * ********** ******* based ** **** **** offering *** (*** *******) BLE (*** *** ** Apple ************), ****/******** ****** the *** ****** *** "shake ** ******". **'* reader ****** *** *** items *** **** **** as **** ** ***** 125k ** ****** **********.

****** ****** *** ** limited ** ******** ********* (e.g. *********, ***** *******) and ************

*. **** *** ****** access ** *** **** whom *** *** ********** visiting *** ****** ** often ** ********** ******** office *********.

*. *** ** **** for ********* **** *** barrier **** ** *** long **** *****, *********** to ****

* ********** *** **** little "*****" **** *** mobile *** ****** *** on * ********'* ****.**** all *** ********* ********** on ******* ** ****** pretty **** **** *** blueetoth *** *** ********* so **** *** ****** was ******* ****** *** reader's **** (*.*. **** they **** *** *** a ***** ) ** was *********** *********** ** the ******.***** ** ******* in *** *** *** you *** *** ********* output *********** (*** ** you ***** **** *****) Apple *****'* ***** *** parties ** *** ***** telephone ******** (*** ********** power *** ** ******* mode) *** ***** *** nothing ** ** ****** to **** ***** **** to ** ******** ** their ***** ** ** go **** **** **** plattform

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless...
Biggest Low Light Problems 2019 on Nov 08, 2019
Over 150 integrators responded to our survey question: "What are the biggest problems you face getting good low-light images?" Inside, we share...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do you know if all applicable codes are being followed? While the...
90+ Companies Profile Directory on Nov 05, 2019
While IPVM covers the largest companies in the industry regularly (like Axis, Dahua, Hikvision, etc.), IPVM strives to do a profile post on each...
IP Camera Mount Shootout - Axis, Bosch, Dahua, Hanwha, Hikvision, Vivotek on Nov 04, 2019
Which manufacturers offer the best or worst mounts? We bought and tested ~50 IP camera mounts and related components from Axis, Bosch, Dahua,...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
France Declares School Facial Recognition Illegal Due to GDPR on Oct 31, 2019
France is the latest European country to effectively prohibit facial recognition as a school access control solution, even with the consent of...
Lock Status Monitoring Tutorial on Oct 28, 2019
Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas...
Security Canada Central Show Report 2019 on Oct 24, 2019
IPVM attended Security Canada Central in Toronto to see what is new in the Canadian market. Inside, we share videos and dozens of images...

Most Recent Industry Reports

ADT Stock Surges - "Leading The Commercial Space" on Nov 15, 2019
Don't call it comeback... but maybe call it a commercial provider. ADT, whose stock dropped by as much as 2/3rds since IPOing in 2018, has now...
Gatekeeper Security Company Profile - Detecting Faces Inside Vehicles on Nov 14, 2019
Border security is a common discussion in mainstream US news and politics, as is the use of banned Chinese equipment by US Government agencies....
Hikvision CEO And Vice-Chair Under PRC Government Investigation on Nov 14, 2019
In a surprising and globally covered move, Hikvision CEO Hu Yangzhong and Vice-Chairman Gong Hongjia are being investigated by China's securities...
Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
UK Big Brother Watch: Hikvision Is 'Morally Bankrupt' on Nov 13, 2019
UK civil liberties advocate Big Brother Watch has condemned Hikvision as being 'morally bankrupt' following IPVM exposing Hikvision marketing...
Color Low Light Mega Camera Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Panasonic, Speco, Sony, Vivotek on Nov 12, 2019
This is the biggest color low light shootout ever, testing 20+ super low light models from 10 manufacturers: Increasingly, each manufacturer...
Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless...
Hikvision Global News Reports Directory on Nov 11, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Hikvision Markets Uyghur Ethnicity Analytics, Now Covers Up on Nov 11, 2019
Hikvision has marketed an AI camera that automatically identifies Uyghurs, on its China website, only covering it up days ago after IPVM questioned...
Open vs End-to-End Systems: Integrator Statistics 2019 on Nov 11, 2019
Preference for open systems is on the decline, according to new IPVM statistics. We asked integrators: For video surveillance systems, do you...