Mobile Credentials (BLE / NFC / Apps) Guide

Author: Brian Rhodes, Published on Sep 30, 2016

One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards.

In this guide, we examine:

  • 4 key management problems
  • 2 practical problems for users
  • BLE vs NFC vs Apps Comparison

Mobile Credentials Are Slick

At a basic level, using mobile phones or tablets as credentials to open doors has a big cool factor.  Take this simple demo of one setup below:

In simple terms, instead of ringing a card, fob, PIN, or fingerprint at a reader, a user flashes a phone and the door is unlocked.  

Based on the rather personal value of phones, the idea that they accompany users like keys, wallets, or ID cards and they are protected (ie: not easily lost or misplaced) items make them good potential card replacements.

Management Problems

However, the transition is not a simple one, especially for commercial access control. A range of credential and access control management issues crop up not often issues with traditional credential methods.  These include:

*** ** *** ******* ****** ** ****** *** *** **** few ***** *** **** *** ******** ** ****** ****** *** access *****.

** **** *****, ** *******:

  • * *** ********** ********
  • * ********* ******** *** *****
  • *** ** *** ** **** **********

Mobile *********** *** *****

** * ***** *****, ***** ****** ****** ** ******* ** credentials ** **** ***** *** * *** **** ******.  **** this ****** **** ** *** ***** *****:

** ****** *****, ******* ** ******* * ****, ***, ***, or *********** ** * ******, * **** ******* * ***** and *** **** ** ********.  

***** ** *** ****** ******** ***** ** ******, *** **** that **** ********* ***** **** ****, *******, ** ** ***** and **** *** ********* (**: *** ****** **** ** *********) items **** **** **** ********* **** ************.

Management ********

*******, *** ********** ** *** * ****** ***, ********** *** commercial ****** *******. * ***** ** ********** *** ****** ******* management ****** **** ** *** ***** ****** **** *********** ********** methods.  ***** *******:

[***************]

***** *** *****

****** ******, **** *********** ****, *** ******* *** - *** the **** ** * ****. *** *** **** ** *********** a ***** ** **** ******, ********* ******** ********* *** ******** updates ***** * **** ******* **** *********** *** *********** **** to ******** **** ******. ** * **** ****** ** ** lost, *** ******** ******** * $** ***** ** *******, ***** if * ***** ****** ** ** ****, ******* **** *** hundreds ** ******* ** ******* **.

**** ** *******

** **** *****, ********* **** *** ** ****** ******** ******.  Therefore, '***** **** *** ******', ** *** **** ***** ******** their ******** ********* ********** **** ******** ******** ********, **** *** ********** ******* ******** ** ********** to ******* ** *** ***** ****** *** ******* ** ****** employer ************ *** ******* ********** ********* ** ******** *******.

******* ******* *******

******* *********** ***** ** **** ******* ** *** ***** **** is ******? ** ******* ************* ****** *** ************** ** *********, even ** **** ****** ***** **** ********* ** * ******? Or **** ********* ************ ******* *******? ****** ***, *** ******** leaves * *** ****** ** ** *********** *** ********* ****** if ****** *********** *** *** ****.

******** ********** ***********

****, ****** ******* *********** **** *** ** ****** ** *** physically *********** **** ********* ***** ** **** ****, ****** *********** must ** ******** *********** ** * ****** **** *** ****** unseen. ***** *** * *** ********* ****, *********** *** ****** for ****** ******** ******* ** *** * ****** ***** ********** is ***** *********** ** *** ***** ******** ** * **** that *** ****** ** *********** ** **** *********.

Practical ********

*** ** ******** ** '****' ********** ******, *********** ******* ******* cards ** **** *** ****** ******* ****** '****' ******** ****** as ****, *********:

******* ** ** ******* ***

****** ******** ***** **** *** ***** ******* **** *** ****'* picture, ****, *** ***** ***** ******** *******, ***** *** **** often ****** ** ******** ** ******. ***** * **** *** be **** ** ******* * ******* **** * *****'* ****** on *******, *** ****** ****** ** ********* ********** ** * glance **** * ******* ** **** *** ****.

********** *********** 

*** *** ***** ** ********* ****** **** *** ** ***** with * ****** ***** ****** ** ****** *********. **** ******** as ***** ** ******* **** *** ****** **** ******, *** their ******* ** ******** *********** ******** ** ********* ********** **** or *****:

******, ******* *****, ********* *********, ******** ********, *** **** *****-******* demands *** ********* ****** **** *****. ***** ***** *** **** to *********** ********** ** ***** ********** ** ******* ***** **** with * ****** **********, *** **** ***** ** ******* * card *********.

******* Mobile ********

** ***** ** *******, ***** ****** ******* ** ****** *********** are **** ** ******:

  • *** (********* *** ******)
  • *** (**** ***** *************)
  • *** ***** ***********

**** *** * ****** ** ******** ******* ********* **** *****, frankly ********** *** **** **. **** ** **** ******:

BLE (Bluetooth *** ******)

***** * ******** ****-******* ** *** ****** *********** ******, *** is *** *** **** ****** ****** ****. *** ****** ** due ** *** ******** ********* ********* ** *** ** ****** phones, *** ********* * ****-******* ************* **** ***** ******* ********** of ***** **** ** ***********.

******* *** ******* ** **** *** ********* ***** *** **** or *** **** ******** ** ***, *** ************* ****** ****** money ** ******* *** ********* **** ********** ** ******* ****.

** ***** ** **********, *** ******** ****** ***** ** ********, so **** ***** ********* *** * *********** *** ******* ********* of ****** ********** *******.

** ******* *** ******* ** *** *** ** *** *** *** ****** ** ****** ******* ****.

NFC (Near ***** *************)

**** *** ****** ****** *******, *** *** *** ****** *********** giant *** ****** ******* ** ***** *** ** ***** **********/********** credential ****** ** ******. ***** ************ **** ***'* '***** *** **' ****** ******* *** *** ******* ** **** ***, *** *** *********** **** ** make *** **** ****** ** ***.

** ***** ** *********, *** *** *******, ********* ************ *** limitation ** ***** ***** ** *** * **********.  **** ** NFC **** *** **** ******* ** ** ****** **********, ** can ** **** ** * ******* **** *** ***** ********* by *******.

*******, *** **** ** *** ** **** ** ***** **** manufacturer ********* ** *** *** ******. ***** *** *********** *********** adoption **.** *** ****** ******* **** **** ********* ****** ** demand/ *******, ** **** ******** **** ****** *** *** ***.

** ***** ** **** *** **** ******* *** *** **'* closest ********** ****** ***, *** ***** ***** ********* ***********:

*** ******* ********** ** *** *** ****** *** **** ******* as ******* *** *** ******* ***********. ******, ***'* *********** *** a ******* ******** ** *** ******** ****** ***'* *** ******.

App *****

** ******** ****** ** ***** ** *** ** ***** ** software ** ******* * **** ****** ******** ****** **** **** the ***** **** * **********. *** *** ****** ***** *** seen ** ******* ********-***** ********* **** *********, *** *** ***** **** ********** ********* **** *********, ********, *** ******.

***** **** ******, ****** ****** ******* ** **** ******* **********, but ****** ******** ********* **** ********* **** ***********. **** ********* requires *********** *** *********** **** **** ** ***** ** ********, and **** ******** **** ******** ******** ****** ****** ****** ******* firewalls ** **** ***********.  *** ***** *******, ** ** *** expect ** *** * ****** ****** ** ***-***** ****** ***********, but ** ******* * ************** ***** ***** *** ***** **.

 

Comments (11)

*** *** *** ************* ** *** ********** *****. ****** *** devices *** **** *** *** *** ** * ********** **** distribution **** ********* *********** ** *** *** ******** ** **** as *** ********** ** ***** ************* *** ******** ******** ******** those ******* ** ******** *** ***.

* **** ***** ** * **** ** ***, *** **** of *** ***** *** *** **** ***********. ** *** ********* by *** ************ **** *-*$ * ***** ***** ** ********* the **** ** * **** ************ *** ** **********. * believe ***** ****** ****** ** ** *** *$ ***** ** less *** **** **** **** ** ********* *********** *** *** market.

******* *** ************ ********* ** ******* *****. *** * *** people *** ****, *** **** *** ***** *********** **** ** 000s ** ********** *** ** *** ********* *** **** ********* with ******** ************ *******.

* ********** *** ****** ** ***** ****** ******* *********** ** this ****** *** ** ****** ***** ** *** ********** **** are *** *** *** ** **** ** ********** **** ***** solutions. *******, *****'* * **** ******** ****** ***** ********** *****. This ** ***** ** ***** *** ******** ** ****** *** it **** ******** * *****, *****, ***. ** ****** ** is *** ******** ** **** *** **** ******** ********* ** the ********* ************, *** **'* **** ******, ********, **** ** send ** *** ********** ****** *** **** ** **** ** a ******* *** ** * ***** ****** ** ****. *** initial **** ** ******** *** ** ******** ** *** *** is ********** ** *** ****** **** ** * ***** **** period ********. ** ** **** *** ********* **** ** ** used **** ******* ** *** ****** ***** ** **** ******* wioth ***** **** ********, ****** **** ********** ************ ** *** main ******* ** *** **** ******* *** ******** ****** ********.

**** ** ********* ** ***** *** ****** ******* ***********?

** *** ********* ** *** ******** *********** ** *** **** since * ** **** *** ** ****** **********. ******* ** certain ************ ** ** ****** ****** ***** ** ** **** to **** ** * ****** ****** *** **** ** **** of * ************ ****** ** ***** **** *******. **** ** being ******** *** ***** *** **** ** **** ****** ****** a ***** ***** **** ****** **** ** ********, **********, *********** operators ******* *** ******* ** **** **** * *****. ** course ** *** **** * ****** *** * ******** ******, you ***** **** **** *** **** ********, *** *** **** a ********* **** ****** ** ******. *******, ** *** **** is *** **** *** *** ***** *** *********, **'* **** flexible ** **** **** (** **** ** ********* ** **** with ******** *****) *** ** **** *** ***** *** ******** for *** ******* **** ****** (** **** *** ****** *******). Of ****** ** ¡** **** ***** ********* *********** ** ***** not ********* **** ** ***.

***'* ** ** ****** ******* ***** **** ******* ** ******** gates?

******, ** ** *** ******** ** ******* *** ** **** as * **** ****** ******* ****** ** *** *** ** all ********** ****** ******* *** ********, *** ******* ** *** title ** *** ****** ** **** **** "****** ***********"

***** *** **** ****** ********** **** ** ***** '*****' ** a *** *** ******* ********** *******, * ** ********* ** keeping ** ********* **** **** ****** **** ** ******* ********** more ******* ******-***** ****** ******* ***********.

*****, **** ** *** **** ** "****** **********"?

**** *********** *** ** ** ***** ***** *** ***** ** merge ****** ******* **** *** *******.

**** * **** **** ***** *'** **** **** ****....*** **** she's ** ********, *** ****** *** ******** **** *** **' memories.

******** *** ****... ***** *** ** *** ******** ***** *******...

**** *******, *** ** ** *** ***** **** ** ** the *** ** *** ******* **** ***'* ****** ****** ********* do *** ******* *** ** **** ** ***. ****** ** readers *** ** ******* ** ******* ******, ****, ** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
Xandem Next Gen Intrusion Tested on Apr 26, 2017
Xandem's "full coverage motion tracking technology" is unlike any intrusion technology we have seen. We bought their new system and tested it...

Most Recent Industry Reports

Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...
Hikvision Marketer Caught Spamming, Fails at Coverup, Fired on May 23, 2017
A Hikvision marketing employee was caught by IPCamTalk trying to surreptitiously disparage IPVM and IPCamTalk. This is an outgrowth of Hikvision's...
Aura's 'Invisible Ripple' Next Gen Intrusion Detection Tested on May 23, 2017
Aura Home is a startup intrusion detection system, but it claims new, high-tech sensing that monitors the 'invisible ripples' movement creates,...
Pelco Shutting Down Clovis Line, Laying Off 200 on May 22, 2017
Pelco's Clovis facility once turned out some of the industry's most popular products. Now, the facility is mostly building "obsolete" equipment,...
IP Camera - 15 Year Shootout on May 22, 2017
How far have IP cameras come? We bought and tested 4 cameras across the past 15 years to understand how much and where performance has...
Remote Video Monitoring Providers Directory on May 21, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact