NFC vs BLE For the Future of Access Control

Author: Brian Rhodes, Published on Mar 04, 2014

Nothing in access control has the hype of NFC but is it for real?

So far the answer has been no.

Despite HID's relentless marketing push for NFC, a competing approach using BLE is increasingly being adopted.

When it comes to mobile credentials, which is better? Which one should you expect to use? Either one? We take a look in this note.

******* ** ****** ******* *** *** **** ** *** *** is ** *** ****?

** *** ********* *** **** **.

******* ***'* ********** ********* **** *** ***, * ********* ******** using BLE ** ************ ***** *******.

**** ** ***** ** ****** ***********, ***** ** ******? ***** one ****** *** ****** ** ***? ****** ***? ** **** a **** ** **** ****.

[***************]

Key *****

*** ****** ******, *** ******* ****** ******* *** ** ******* mobile *********** ** ***********. ************, ***** *** **** ** **** themselves ** ******** **** ** ****** *** ******* *** ***** apps ** ***** *****.

******, *** **** ********* *** ***** ** ********** *** ********* marketing ** *** ***** **** ****** **** ** ************* ****** devices ** ***** ** * ****** *****, **** **** ***** strongly ********** **** *** **********.

*******, ** ** ***** **** ** *** ******** *****, *** is *** *** **** ********** **** *** ** **** ** this ***, *** **** *** ****.

BLE ********

*** ****** *** ********* *** ******. ** ** ** ******** of '*******' *********, **** *** **** *********** **** ** *********** ***** *** ***** ********* **** '*******'. *** ****** ** that ** ******** *** **** *****, ******** ** ** *** off ********* *** ******** *******. ***** ****** *********** *** *** '*******' *********.

BLE ** ***

** ******** *** **** *** ** *** ********* ****** *****:

  • **** ** ***
  • *****
  • ****
  • ********
  • *****

*** ***** ***** ********** *** ********* ** **** ****** ** each ******:

Ease ** ***

**** *** ******** ******** ** **********, *** ******* *** *****. At *** ******* ****, * **** ******* ** ****** * phone ** ** ****** ***** **** **** ** ***** ** app *** ******* *** ****** ***** ** * ****** ** lock. *** **** ****** ************, ****** ****** ******** ******* * permanent *********** ********** *** ** ***-******, *****-***** ******** ************ **** the ***** ** *** ****. ***** **** *********** '**********' ***** from ******* ** ***** ***** ***********, ** ****** * **** burden ** *** **** ** ***** * *******, *********, *** properly *********** **********.

*****

*** ******* ********** ** ********* ******* *** *** ** *** effective ***** ******* ****** *** **********. **** ***, *** '********* range' ** ~*** **** (***), ***** *** ** ~* ****** (20cm) ** ****. ** ****** ****, *** ****** ***** *** be ***** **** **** ********* ***** *** ****** ****** **** feet, *** *** *** * **** ****** ********* *****. *** radio ********* ** *** ** **.** *** ***** *** ****** are *.* *** *** *****.

**** **** *** ***** ***** ** *** ** * '******** feature' **** ***** ******** **** ********** ******** *********, ******* ****** applications ***** ******* **** * ****** *****, ********** ******* **** and ******* ********* ******. ****** **** ******* *** **** ** position * ***** ****** ****** ** * ****** ***** ******* in * *** ****, *** **** *** **** ********* ***** up ** *** **** ****** *** *******.

******* **********, ****** *** *** ********* * *** ****** ** access, ** **** *** ** "*:*" ***** *** ** "*:****". Potentially, * *** **** ***** ****** ***** ** *** ******** and **** ***-**** *** *** ****** ***** ** *** ****, the ***** ***** ** *** ***** *** ***-********* ******* *** lock *** ***** ** *********** *** ******.

****

** ******** ** *** ******** ********** ** *****, ***** ** a ******** **** ********** ** ****, *** *********** * ***** one. ***** *** ** *******, *********** ********* **** **** ***. According ** ********* *** **********, **** ****** ******** **** *** a*** **** *** ** ~$**** - $****** ********* ***, ***** *** ******* ** *'*** ******** *****' ******* ~$*.** - $*.** *** *************** ** '********' ** '**********' ***********.

******, *** **** ** *** *** **** ***** ** *** of *** ******* ******* ********* ***** *** *** ** ********* ***** ******* *** *** ***** ******* ** ******* ***-***** ************ like*******.

********

** *** ***** ** ********, ********** *******. **** ***** *** is **** ****** ** ******, ***** *** ********** ************ ******** very ***** *********. *******, **** *** ** ****** ** ** used ****** * ********-********* ***, ** * ******* '****' **** take ****. ********** ** ****** ****** ** **********, **** *** being ****** **** * ******** ***-*** *** ********** *** *** having * ******* *** *********** ****** ********* *************.

** *** ****, * ****** '***** *****' ***** ******* ** either ********** ** ********, *** * **** ******* **** ** a ****** ***** *** ********, ** ***** ****** ******** ** equally **********.

*****

*** ******** ********* *** *** ***** ** *** ********** ** power. *** ******** ** ******** ***** ******, *** *** ** passively ******* ** ****** ***** ** ******, ***** *** ******** a ***** ****** **** ******.  **** * *** ************ ***** of ****, ****** ****** **** *** **** **** ** ******** data, *** *** **** ******** ***** ** *******. *** **** practical ****** ** **** ********** ** **** *** **** ** reader ******** * ***** ******, *** ******* ********** ******** **** the ***** ** *** ********. 

** *** ************ ** * '**** *****' *******, ** *** based ****** ****** *** *********** ****** *** ****** ***** ******** enough ***** ** *** *****'* *** **** ** ***** * read, *** **** *** ** **** *********** ******.

Access ******* ***********

* ****** ** ******** ***** ****** ******** *** ********* ** the ******. **** *** * ******:

*** *****

*** ***** 

****** **** ********* ****** **** *******. ** * *****, ************* are *** ***** ** * '*** ** *** *****' ********, and ******** *** **** ** **** **** ****** ******.  *******, far **** *** ************ **** **** *********, ***** ***'* ******* impact ** *** *** **** ** ****. *************, **** ** the***** *** ******** ** ****** *** ***** ** **** *****(**: ***, ****) *** ******* ******** ** *** ** *** access ******* *****.

*** *******, *** *** *** *** ********* ** *******, ******* Phone *, *** **********. *** ****** ******* ***** ** *** two ******* ***** **** ***** ***, ***** **** *** ******* NFC *** ***** ****** ** *** ******.

Comments (12)

*** *****'* **** **** ***. ***** **** ********* ** ********, NFC **** ****** **** **** * ***** *** *** ****** control *******. ********** *** **** ****.

* ***** **** ***, ******** ** ** ***** ********** **** NFC ** ********* ** ******* *** **** * ****** ****** market ***** ** ****** **** *****. *** *** *** ** big ** ***** *******, *** ***** *** **** ******* ***** it ***** *** *** **** ******* *** *****.

***** *** ***** *** **** ******. *'* ********* ****** *************** on **** ********** *** *** ******* *** **** *******. *** are ******* *** ********* **** **'* ******* * **** **** and *********'* *** * ***** **** **** ****, ** **** next ****. *** ***** - ********** *******....

****, *** *** ********* ** "*** *** ******* *** *********..."

*** *** ****** * *** ** ****? **** *** **** quoting ************?

****** ***** ** ** ******** "*******" ** "******** ***/** ******." The ****** * *** ********** ******* **** *** ************ **** in ***** ** *** *** **** *** *** ***** ******* up *** *** *****. *** *** ** ********* * *** on *** **** **** *** **** ******* ***** *** **** will **** ***** * ****** **** *** *** *** ***** instead ** * **********. *** * ****** ** ******** ********* (like **** ***** *** ***? ******?) ******* *** ** ** the ********** ***** *** *** * ***** ** *************. ***** they **** **** ******* ** *** **********, ** **** **** had ** **** ** *** **** *****. ** *** *** inspire **********...

**! * *** ********* ** ** ***** '*******' ** '*********' or '*******' ** '********** **** *****' - ********* *** :)

**** * *** ** ***** *****. *** *** ** *** equations ** ******* ** *****. ******* *** ****. *** ** requiring **? *********? *** **** ******* ** ******? **** '*** My **** *****'! *** ** **** **** **** *** *** many "! *** ** ******** * **** ** **** ***** now"! *** **** *********, *** ********, ***. ** *** ***** cells **** *******? **** **** * ******? ****** **** *** does *** ************* ****** **** **** *** **** ** *** cell ** ****** ** *********? **** *********, ...***

* ***** * *** *** ******* **** * ***** ***** of ***, *** **** * ***** *** *** **** ** app, *** **** **** * ***** **** *** *** *** to ************ **** *********** ***** ****. * ********* ******* *** NFC ***** **** * **** ****** ******* ** ********** ***** you ***** **** ******* **.

* ********** ***** *** *** *** *** ************** ******** * higher ********, *** ** ***** **** ********** **** **** ******** a **** *** ********** ** ** *** ******. * ******'* see ****** ******* ** *** ***, *'* ****** **** * card. * **** ** **** ** ** ***** *** **** anyways, ** *** **** **** ***** ****** **.

****** *'* ***** ***** *** *** *** ********** *****?

***** ** ** * **** *****..**** ****** *****. **** **** summary ***** ****** ** ****. **********….** **** ***** * *** several *** *** **** ***** ********** ********. *** ** ** RFID ******** ** ***** ** ** ******** **** *********** ****** control ******* ***** ******* ** **** ********…**** *** ***** ***** vendors (** *****) ******* ********* *** ***** – (***** **** in **** *** *******). *** ***** ** **** ***** ** very *********** ***** *** **** ***** ** ******** ** *** more **** * ** (*** *****..) *** ** ****** ******** for *** *** ** ***** **** ********. *** *** **** more *** ***** ** * ****** ** **** ***** ********* thanks ** **** ********* *** *****...********* **********, ****** *******, ********* and ***********. *** ****** **** *** ***** *** ****** *********** between *** ***..******* ****** *** *** ********** **** *********** *** product ********** ** ********.

******** *** ****** ********** ***…..*** ********* ****** **** *** ****** control ** ***% *** ********** (******** ***** ****** ****** – after ** ***** ** ******)..** ** *** **** ** *** BLE *** ****** *** ****** **** ** ****** ******* ** 2.4Ghz. ***** *** **** ***** ****** *.**** ***** ******* ** the ******? ****** ****…*****??

* ***** ** ** *** ******/** ***** **** ** ****** of *********** *** **** ** ** ********* *** **** ********** and ***** ** ****** ** *** ** ****** ***** ********** (if **** *** *******) ** *** ***** ** **** ******** or *********. **** **** **** ***** *** ********** *********** *** not ******** ********* ** **** *******…******* ****** *** ** *** as ************. ********* **** ** **** ** ***** *** ******** more ****** *** ****’* ******* * **** *****.

****** *** *** ********, ****.

**** ********** ** **** * **** *** *** *'** **** asked ** * ***** ********* ** **** * *** ********* cell ***** *** ** * **********.

* *****' ** ** *** **** **** *** **** **** there **** ******* ********* ******* *** ***/** ***.

** *** **** **** *** **** ****** ******** ** ***?

** **, *** *** *** ******* ** **** ***** *** do **** **** ********** ***********?

******!

'****** ***********' *** *** ***** ****, *** ********** ****** ******** is ***** ****. **** *** ****, ** ** ***** * 'buzzword', *** *****'* ** *********** ******* ********, **** **********.

** *** **** *******, *** ********* ** ****** *** *** the ****** ********* ****. ***** ************* **** ***** ******* ** cited ** *** **** ******, ** *** ******** ** *********** are *** **********.

*** ****** ********* ** *** ******** ******* (***** **********, ***** padlocks, ******* *****,******** *******, ***) *** ********* ******** ***, ****, ** ******/*-**** *****, with *** '**********' *** ***** *********** ** ** ***.

*** ******** ** *** *** *********** ***** ** ** ** a ************ ****** *** *** ****** ********* ******** ** ***. (see:*** ******** ****** *** ******)

***** *** ***** *** ** **'* ******, *** ** ** a ***-******** ************** **** *********** **** ******** ******** - *** access *********** ** ***** ************.

*******, ************** **** ******** **** ***** ** ******* ** ******** ******** ****. ** **** ***** **** **** *********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
The Interceptor Aims To Fix Vulnerability In Millions of Alarm Systems on Jan 08, 2018
Security executive Jeffery Zwirn claims a 'catastrophic' flaw exists in 'millions of alarm systems', and dealers could be liable if not fixed. The...
Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...
Resolution Tutorial on Dec 28, 2017
Understanding video surveillance resolution can be surprisingly difficult and complex. While the word 'resolution' seems self-explanatory, its use...
Amazon Acquires Blink on Dec 22, 2017
Amazon has made their first significant acquisition in the connected home space, buying wire-free camera manufacturer Blink. We examine Amazon's...
NVRs - Embedded vs Separate PoE Switch (Statistics) on Dec 21, 2017
Many NVRs now offer PoE switches embedded, allowing IP cameras to be connected directly to the recorder. On the plus side, these units can...
2018 Top Sales Interest For Integrators on Dec 20, 2017
130+ integrators answered: This is a key question, especially for manufacturers, as it impacts what areas to focus more on and what...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...

Most Recent Industry Reports

This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...
"First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
Winter 2018 Camera Course Registration on Jan 14, 2018
Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times - 'day' and...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
Hanwha ExtraLux Camera Tested on Jan 11, 2018
Hanwha has released the latest in their Wisenet X line, the "extraLUX" series, claiming to "capture crystal clear, true-color images in low-light...
Security Integrator Project Management Certifications on Jan 10, 2018
Certifications are a common option for technology professionals looking to improve skills and gain validation. But how about for project...
Canon Launches World's Most Expensive IP Camera (ME20F-SHN) on Jan 09, 2018
Canon has launched the ME20F-SHN , likely the world's most expensive single imager, non-thermal, IP camera at ~$20,000. And Canon subsidiary...
Hikvision Declares 'Never Click On Links In Emails' on Jan 09, 2018
Hikvision is stepping up its cybersecurity efforts with a clear recommendation - to never click on links in emails: It is a surprising change...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact