NFC vs BLE For the Future of Access Control

Author: Brian Rhodes, Published on Mar 04, 2014

Nothing in access control has the hype of NFC but is it for real?

So far the answer has been no.

Despite HID's relentless marketing push for NFC, a competing approach using BLE is increasingly being adopted.

When it comes to mobile credentials, which is better? Which one should you expect to use? Either one? We take a look in this note.

******* ** ****** ******* *** *** **** ** *** *** is ** *** ****?

** *** ********* *** **** **.

******* ***'* ********** ********* **** *** ***, * ********* ******** using BLE ** ************ ***** *******.

**** ** ***** ** ****** ***********, ***** ** ******? ***** one ****** *** ****** ** ***? ****** ***? ** **** a **** ** **** ****.

[***************]

Key *****

*** ****** ******, *** ******* ****** ******* *** ** ******* mobile *********** ** ***********. ************, ***** *** **** ** **** themselves ** ******** **** ** ****** *** ******* *** ***** apps ** ***** *****.

******, *** **** ********* *** ***** ** ********** *** ********* marketing ** *** ***** **** ****** **** ** ************* ****** devices ** ***** ** * ****** *****, **** **** ***** strongly ********** **** *** **********.

*******, ** ** ***** **** ** *** ******** *****, *** is *** *** **** ********** **** *** ** **** ** this ***, *** **** *** ****.

BLE ********

*** ****** *** ********* *** ******. ** ** ** ******** of '*******' *********, **** *** **** *********** **** ** *********** ***** *** ***** ********* **** '*******'. *** ****** ** that ** ******** *** **** *****, ******** ** ** *** off ********* *** ******** *******. ***** ****** *********** *** *** '*******' *********.

BLE ** ***

** ******** *** **** *** ** *** ********* ****** *****:

  • **** ** ***
  • *****
  • ****
  • ********
  • *****

*** ***** ***** ********** *** ********* ** **** ****** ** each ******:

Ease ** ***

**** *** ******** ******** ** **********, *** ******* *** *****. At *** ******* ****, * **** ******* ** ****** * phone ** ** ****** ***** **** **** ** ***** ** app *** ******* *** ****** ***** ** * ****** ** lock. *** **** ****** ************, ****** ****** ******** ******* * permanent *********** ********** *** ** ***-******, *****-***** ******** ************ **** the ***** ** *** ****. ***** **** *********** '**********' ***** from ******* ** ***** ***** ***********, ** ****** * **** burden ** *** **** ** ***** * *******, *********, *** properly *********** **********.

*****

*** ******* ********** ** ********* ******* *** *** ** *** effective ***** ******* ****** *** **********. **** ***, *** '********* range' ** ~*** **** (***), ***** *** ** ~* ****** (20cm) ** ****. ** ****** ****, *** ****** ***** *** be ***** **** **** ********* ***** *** ****** ****** **** feet, *** *** *** * **** ****** ********* *****. *** radio ********* ** *** ** **.** *** ***** *** ****** are *.* *** *** *****.

**** **** *** ***** ***** ** *** ** * '******** feature' **** ***** ******** **** ********** ******** *********, ******* ****** applications ***** ******* **** * ****** *****, ********** ******* **** and ******* ********* ******. ****** **** ******* *** **** ** position * ***** ****** ****** ** * ****** ***** ******* in * *** ****, *** **** *** **** ********* ***** up ** *** **** ****** *** *******.

******* **********, ****** *** *** ********* * *** ****** ** access, ** **** *** ** "*:*" ***** *** ** "*:****". Potentially, * *** **** ***** ****** ***** ** *** ******** and **** ***-**** *** *** ****** ***** ** *** ****, the ***** ***** ** *** ***** *** ***-********* ******* *** lock *** ***** ** *********** *** ******.

****

** ******** ** *** ******** ********** ** *****, ***** ** a ******** **** ********** ** ****, *** *********** * ***** one. ***** *** ** *******, *********** ********* **** **** ***. According ** ********* *** **********, **** ****** ******** **** *** a*** **** *** ** ~$**** - $****** ********* ***, ***** *** ******* ** *'*** ******** *****' ******* ~$*.** - $*.** *** *************** ** '********' ** '**********' ***********.

******, *** **** ** *** *** **** ***** ** *** of *** ******* ******* ********* ***** *** *** ** ********* ***** ******* *** *** ***** ******* ** ******* ***-***** ************ like*******.

********

** *** ***** ** ********, ********** *******. **** ***** *** is **** ****** ** ******, ***** *** ********** ************ ******** very ***** *********. *******, **** *** ** ****** ** ** used ****** * ********-********* ***, ** * ******* '****' **** take ****. ********** ** ****** ****** ** **********, **** *** being ****** **** * ******** ***-*** *** ********** *** *** having * ******* *** *********** ****** ********* *************.

** *** ****, * ****** '***** *****' ***** ******* ** either ********** ** ********, *** * **** ******* **** ** a ****** ***** *** ********, ** ***** ****** ******** ** equally **********.

*****

*** ******** ********* *** *** ***** ** *** ********** ** power. *** ******** ** ******** ***** ******, *** *** ** passively ******* ** ****** ***** ** ******, ***** *** ******** a ***** ****** **** ******.  **** * *** ************ ***** of ****, ****** ****** **** *** **** **** ** ******** data, *** *** **** ******** ***** ** *******. *** **** practical ****** ** **** ********** ** **** *** **** ** reader ******** * ***** ******, *** ******* ********** ******** **** the ***** ** *** ********. 

** *** ************ ** * '**** *****' *******, ** *** based ****** ****** *** *********** ****** *** ****** ***** ******** enough ***** ** *** *****'* *** **** ** ***** * read, *** **** *** ** **** *********** ******.

Access ******* ***********

* ****** ** ******** ***** ****** ******** *** ********* ** the ******. **** *** * ******:

*** *****

*** ***** 

****** **** ********* ****** **** *******. ** * *****, ************* are *** ***** ** * '*** ** *** *****' ********, and ******** *** **** ** **** **** ****** ******.  *******, far **** *** ************ **** **** *********, ***** ***'* ******* impact ** *** *** **** ** ****. *************, **** ** the***** *** ******** ** ****** *** ***** ** **** *****(**: ***, ****) *** ******* ******** ** *** ** *** access ******* *****.

*** *******, *** *** *** *** ********* ** *******, ******* Phone *, *** **********. *** ****** ******* ***** ** *** two ******* ***** **** ***** ***, ***** **** *** ******* NFC *** ***** ****** ** *** ******.

Comments (12)

NFC doesn't work with iOS. Until this situation is resolved, NFC will remain very much a niche app for access control purpose. Waaaaaaaay too much hype.

I agree with you, although it is worth mentioning that NFC is supported by Android who owns a larger global market share of phones than Apple. NFC may not be big in North America, but there are some markets where it works and has been working for years.

Great job Brian and good timing. I'm currently making recommendations on this technology and the article was very helpful. SIs are quoting NFC solutions like it's already a done deal and everybody's got a phone that will work, or will next week. But still - conjecture abounds....

Skip, can you elaborate on "SIs are quoting NFC solutions..."

You are seeing a lot of them? What are they quoting specifically?

Please allow me to rephrase "quoting" as "pitching and/or hyping." The quotes I did eventually receive were for conventional PACS in spite of all the time the Sis spent talking up the new stuff. The two SI companies I met on the site both got very excited about how they will soon offer a system that can use the phone instead of a credential. But a couple of specific questions (like long range AND NFC? Really?) quickly got me to the impression there was not a depth of understanding. Maybe they were just excited by new technology, or felt they had to talk up the next thing. It did not inspire confidence...

Ok! I was wondering if it meant 'winning' or 'deploying' or 'working' or 'satisfying real users' - evidently not :)

Like a lot of great ideas. Not all of the equations is offered up front. Walking the walk. Who is requiring it? Employers? Who will provide he device? Ergo 'Not My cell phone'! Way to many apps have Way too many "! can do anything I want to your phone now"! How many employers, Gov Agencies, etc. do not allow cells with cameras? Then just a dongle? Either case how does the interrogating device know that the hand on the cell or dongle is authentic? Just wondering, ...Cal

I admit I was all excited when I first heard of NFC, but then I found out you need an app, and from what I hgave read the app has to authenticate your credentials using data. I initially assumed the NFC would have a card number similar to convential cards you could then program in.

I understand using the app and the authentication provides a higher security, but it seems more combersome than just carrying a card and presenting it at the reader. I couldn't see myself wanting to use NFC, I'd rather have a card. I have to wear an ID badge for work anyways, so the card sits right behind it.

Unless I'm wrong about how the NFC credential works?

Sorry to be a late comer..busy couple weeks. Very good summary Brian thanks so much. Disclosure….In past lives I led several HID and Assa Abloy businesses globally. NFC is an RFID solution so there is no surprise that traditional access control players would default to this solution…plus the major phone vendors (ex Apple) started including NFC first – (Nokia back in 2006 for example). The issue of read range is very interesting since NFC read range in practice is not more than a cm (ISO 14443..) and is mainly designed for tap and go usage like payments. BLE has many more use cases as a result of long range potential thanks to both frequency and power...including automotive, mobile medical, computers and peripherals. You should note the speed and memory differences between the two..clearly making the BLE technology more interesting for product developers to consider.

Consider the reader population too…..the installed reader base for access control is 100% not compatible (actually still mostly 125kHz – after 10 years of iClass)..so if you want to use BLE for access you either need to update readers to 2.4Ghz. Maybe you will start seeing 2.4Ghz combo readers in the market? Access mfgs…hello??

I think it is not either/or there will be plenty of opportunity for apps to be developed for each technology and ought to permit an app to decide which technology (if both are present) to use based on user settings or situation. Just like RFID cards and smartphone credentials are not mutually exclusive as form factors…neither should NFC or BLE as technologies. Suppliers will be able to offer the consumer more choice and that’s usually a good thing.

Thanks for the thoughts, Marc.

This discussion is over a year old but I've been asked by a major developer to give a ROM regarding cell phone use as a credential.

I didnt' go to ISC this year but last year there were several companies touting NFC and/or BLE.

In the past year has this gained traction at all?

If so, who are the leaders in this space and do they have successful deployments?

Thanks!

'Mobile credentials' are not going away, but commercial access adoption is still weak. Like you note, it is still a 'buzzword', but there's no substantial enduser adoption, just curiousity.

In the home segment, BLE continues to outleg NFC for the medium typically used. Wider compatability with phone devices is cited as the main reason, as the majority of smartphones are BLE compatible.

The recent onslaught of IoT consumer devices (smart themostats, smart padlocks, barrier locks, location beacons, etc) are generally building BLE, WiFi, or ZigBee/Z-Wave first, with NFC 'roadmapped' for later development if at all.

The weakness of NFC was anecdotally cited to us as a contributing reason for the recent executive turnover at HID. (see: HID Troubles Behind CEO Ouster)

Apple has added NFC to it's phones, but it is a non-standard implementation that essentially only supports ApplePay - not access credentials or other applications.

However, several sources have reported that Apple is talking to HID about changing this. No firm plans have been announced.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
VMS Export Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Sep 13, 2018
When crimes, accidents or problems occur, exporting video from one's video surveillance system is critical to proving incidents. But who does it...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Backup Power for Large Security Systems Tutorial on Aug 24, 2018
Choosing the right backup power system depends on system size. While small and medium systems greatly benefit from using UPS battery backup...
Assa Aperio Wireless Access Reader R100 Tested on Aug 23, 2018
Wireless access control is frequently promoted by manufacturers as a way to cut installation costs. Perhaps the biggest proponent of this is mega...
Synology Surveillance Station VMS Tested on Aug 22, 2018
With so many low-cost NVRs and enterprise VMSes, is there any place in the market for NAS-based VMSes? Recently, IPVM bought a Synology NAS for...

Most Recent Industry Reports

25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Hikvision USA Starts Layoffs on Sep 18, 2018
Hikvision USA has started layoffs, just weeks after the US government ban was passed into law. Inside this note, we examine: The important...
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...
Vivotek 4MP Camera Tested (FD8379-HV) on Sep 13, 2018
Next in our series of updated 4MP testing, we bought and tested Vivotek's FD8379-HV, and entry level 4MP model claiming "top-notch quality video in...
Ascent / MONI Faces Lender Lawsuit and Debt Crisis on Sep 13, 2018
ASCMA, aka Ascent, aka Brinks Home Security, aka MONI, aka Monitronics is being sued by a group of their lenders who allege: As of June 30,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact