NFC vs BLE For the Future of Access Control

Author: Brian Rhodes, Published on Mar 04, 2014

Nothing in access control has the hype of NFC but is it for real?

So far the answer has been no.

Despite HID's relentless marketing push for NFC, a competing approach using BLE is increasingly being adopted.

When it comes to mobile credentials, which is better? Which one should you expect to use? Either one? We take a look in this note.

******* ** ****** ******* *** *** **** ** *** *** is ** *** ****?

** *** ********* *** **** **.

******* ***'* ********** ********* **** *** ***, * ********* ******** using BLE ** ************ ***** *******.

**** ** ***** ** ****** ***********, ***** ** ******? ***** one ****** *** ****** ** ***? ****** ***? ** **** a **** ** **** ****.

[***************]

Key *****

*** ****** ******, *** ******* ****** ******* *** ** ******* mobile *********** ** ***********. ************, ***** *** **** ** **** themselves ** ******** **** ** ****** *** ******* *** ***** apps ** ***** *****.

******, *** **** ********* *** ***** ** ********** *** ********* marketing ** *** ***** **** ****** **** ** ************* ****** devices ** ***** ** * ****** *****, **** **** ***** strongly ********** **** *** **********.

*******, ** ** ***** **** ** *** ******** *****, *** is *** *** **** ********** **** *** ** **** ** this ***, *** **** *** ****.

BLE ********

*** ****** *** ********* *** ******. ** ** ** ******** of '*******' *********, **** *** **** *********** **** ** *********** ***** *** ***** ********* **** '*******'. *** ****** ** that ** ******** *** **** *****, ******** ** ** *** off ********* *** ******** *******. ***** ****** *********** *** *** '*******' *********.

BLE ** ***

** ******** *** **** *** ** *** ********* ****** *****:

  • **** ** ***
  • *****
  • ****
  • ********
  • *****

*** ***** ***** ********** *** ********* ** **** ****** ** each ******:

Ease ** ***

**** *** ******** ******** ** **********, *** ******* *** *****. At *** ******* ****, * **** ******* ** ****** * phone ** ** ****** ***** **** **** ** ***** ** app *** ******* *** ****** ***** ** * ****** ** lock. *** **** ****** ************, ****** ****** ******** ******* * permanent *********** ********** *** ** ***-******, *****-***** ******** ************ **** the ***** ** *** ****. ***** **** *********** '**********' ***** from ******* ** ***** ***** ***********, ** ****** * **** burden ** *** **** ** ***** * *******, *********, *** properly *********** **********.

*****

*** ******* ********** ** ********* ******* *** *** ** *** effective ***** ******* ****** *** **********. **** ***, *** '********* range' ** ~*** **** (***), ***** *** ** ~* ****** (20cm) ** ****. ** ****** ****, *** ****** ***** *** be ***** **** **** ********* ***** *** ****** ****** **** feet, *** *** *** * **** ****** ********* *****. *** radio ********* ** *** ** **.** *** ***** *** ****** are *.* *** *** *****.

**** **** *** ***** ***** ** *** ** * '******** feature' **** ***** ******** **** ********** ******** *********, ******* ****** applications ***** ******* **** * ****** *****, ********** ******* **** and ******* ********* ******. ****** **** ******* *** **** ** position * ***** ****** ****** ** * ****** ***** ******* in * *** ****, *** **** *** **** ********* ***** up ** *** **** ****** *** *******.

******* **********, ****** *** *** ********* * *** ****** ** access, ** **** *** ** "*:*" ***** *** ** "*:****". Potentially, * *** **** ***** ****** ***** ** *** ******** and **** ***-**** *** *** ****** ***** ** *** ****, the ***** ***** ** *** ***** *** ***-********* ******* *** lock *** ***** ** *********** *** ******.

****

** ******** ** *** ******** ********** ** *****, ***** ** a ******** **** ********** ** ****, *** *********** * ***** one. ***** *** ** *******, *********** ********* **** **** ***. According ** ********* *** **********, **** ****** ******** **** *** a*** **** *** ** ~$**** - $****** ********* ***, ***** *** ******* ** *'*** ******** *****' ******* ~$*.** - $*.** *** *************** ** '********' ** '**********' ***********.

******, *** **** ** *** *** **** ***** ** *** of *** ******* ******* ********* ***** *** *** ** ********* ***** ******* *** *** ***** ******* ** ******* ***-***** ************ like*******.

********

** *** ***** ** ********, ********** *******. **** ***** *** is **** ****** ** ******, ***** *** ********** ************ ******** very ***** *********. *******, **** *** ** ****** ** ** used ****** * ********-********* ***, ** * ******* '****' **** take ****. ********** ** ****** ****** ** **********, **** *** being ****** **** * ******** ***-*** *** ********** *** *** having * ******* *** *********** ****** ********* *************.

** *** ****, * ****** '***** *****' ***** ******* ** either ********** ** ********, *** * **** ******* **** ** a ****** ***** *** ********, ** ***** ****** ******** ** equally **********.

*****

*** ******** ********* *** *** ***** ** *** ********** ** power. *** ******** ** ******** ***** ******, *** *** ** passively ******* ** ****** ***** ** ******, ***** *** ******** a ***** ****** **** ******.  **** * *** ************ ***** of ****, ****** ****** **** *** **** **** ** ******** data, *** *** **** ******** ***** ** *******. *** **** practical ****** ** **** ********** ** **** *** **** ** reader ******** * ***** ******, *** ******* ********** ******** **** the ***** ** *** ********. 

** *** ************ ** * '**** *****' *******, ** *** based ****** ****** *** *********** ****** *** ****** ***** ******** enough ***** ** *** *****'* *** **** ** ***** * read, *** **** *** ** **** *********** ******.

Access ******* ***********

* ****** ** ******** ***** ****** ******** *** ********* ** the ******. **** *** * ******:

*** *****

*** ***** 

****** **** ********* ****** **** *******. ** * *****, ************* are *** ***** ** * '*** ** *** *****' ********, and ******** *** **** ** **** **** ****** ******.  *******, far **** *** ************ **** **** *********, ***** ***'* ******* impact ** *** *** **** ** ****. *************, **** ** the***** *** ******** ** ****** *** ***** ** **** *****(**: ***, ****) *** ******* ******** ** *** ** *** access ******* *****.

*** *******, *** *** *** *** ********* ** *******, ******* Phone *, *** **********. *** ****** ******* ***** ** *** two ******* ***** **** ***** ***, ***** **** *** ******* NFC *** ***** ****** ** *** ******.

Comments (12)

*** *****'* **** **** ***. ***** **** ********* ** ********, NFC **** ****** **** **** * ***** *** *** ****** control *******. ********** *** **** ****.

* ***** **** ***, ******** ** ** ***** ********** **** NFC ** ********* ** ******* *** **** * ****** ****** market ***** ** ****** **** *****. *** *** *** ** big ** ***** *******, *** ***** *** **** ******* ***** it ***** *** *** **** ******* *** *****.

***** *** ***** *** **** ******. *'* ********* ****** *************** on **** ********** *** *** ******* *** **** *******. *** are ******* *** ********* **** **'* ******* * **** **** and *********'* *** * ***** **** **** ****, ** **** next ****. *** ***** - ********** *******....

****, *** *** ********* ** "*** *** ******* *** *********..."

*** *** ****** * *** ** ****? **** *** **** quoting ************?

****** ***** ** ** ******** "*******" ** "******** ***/** ******." The ****** * *** ********** ******* **** *** ************ **** in ***** ** *** *** **** *** *** ***** ******* up *** *** *****. *** *** ** ********* * *** on *** **** **** *** **** ******* ***** *** **** will **** ***** * ****** **** *** *** *** ***** instead ** * **********. *** * ****** ** ******** ********* (like **** ***** *** ***? ******?) ******* *** ** ** the ********** ***** *** *** * ***** ** *************. ***** they **** **** ******* ** *** **********, ** **** **** had ** **** ** *** **** *****. ** *** *** inspire **********...

**! * *** ********* ** ** ***** '*******' ** '*********' or '*******' ** '********** **** *****' - ********* *** :)

**** * *** ** ***** *****. *** *** ** *** equations ** ******* ** *****. ******* *** ****. *** ** requiring **? *********? *** **** ******* ** ******? **** '*** My **** *****'! *** ** **** **** **** *** *** many "! *** ** ******** * **** ** **** ***** now"! *** **** *********, *** ********, ***. ** *** ***** cells **** *******? **** **** * ******? ****** **** *** does *** ************* ****** **** **** *** **** ** *** cell ** ****** ** *********? **** *********, ...***

* ***** * *** *** ******* **** * ***** ***** of ***, *** **** * ***** *** *** **** ** app, *** **** **** * ***** **** *** *** *** to ************ **** *********** ***** ****. * ********* ******* *** NFC ***** **** * **** ****** ******* ** ********** ***** you ***** **** ******* **.

* ********** ***** *** *** *** *** ************** ******** * higher ********, *** ** ***** **** ********** **** **** ******** a **** *** ********** ** ** *** ******. * ******'* see ****** ******* ** *** ***, *'* ****** **** * card. * **** ** **** ** ** ***** *** **** anyways, ** *** **** **** ***** ****** **.

****** *'* ***** ***** *** *** *** ********** *****?

***** ** ** * **** *****..**** ****** *****. **** **** summary ***** ****** ** ****. **********….** **** ***** * *** several *** *** **** ***** ********** ********. *** ** ** RFID ******** ** ***** ** ** ******** **** *********** ****** control ******* ***** ******* ** **** ********…**** *** ***** ***** vendors (** *****) ******* ********* *** ***** – (***** **** in **** *** *******). *** ***** ** **** ***** ** very *********** ***** *** **** ***** ** ******** ** *** more **** * ** (*** *****..) *** ** ****** ******** for *** *** ** ***** **** ********. *** *** **** more *** ***** ** * ****** ** **** ***** ********* thanks ** **** ********* *** *****...********* **********, ****** *******, ********* and ***********. *** ****** **** *** ***** *** ****** *********** between *** ***..******* ****** *** *** ********** **** *********** *** product ********** ** ********.

******** *** ****** ********** ***…..*** ********* ****** **** *** ****** control ** ***% *** ********** (******** ***** ****** ****** – after ** ***** ** ******)..** ** *** **** ** *** BLE *** ****** *** ****** **** ** ****** ******* ** 2.4Ghz. ***** *** **** ***** ****** *.**** ***** ******* ** the ******? ****** ****…*****??

* ***** ** ** *** ******/** ***** **** ** ****** of *********** *** **** ** ** ********* *** **** ********** and ***** ** ****** ** *** ** ****** ***** ********** (if **** *** *******) ** *** ***** ** **** ******** or *********. **** **** **** ***** *** ********** *********** *** not ******** ********* ** **** *******…******* ****** *** ** *** as ************. ********* **** ** **** ** ***** *** ******** more ****** *** ****’* ******* * **** *****.

****** *** *** ********, ****.

**** ********** ** **** * **** *** *** *'** **** asked ** * ***** ********* ** **** * *** ********* cell ***** *** ** * **********.

* *****' ** ** *** **** **** *** **** **** there **** ******* ********* ******* *** ***/** ***.

** *** **** **** *** **** ****** ******** ** ***?

** **, *** *** *** ******* ** **** ***** *** do **** **** ********** ***********?

******!

'****** ***********' *** *** ***** ****, *** ********** ****** ******** is ***** ****. **** *** ****, ** ** ***** * 'buzzword', *** *****'* ** *********** ******* ********, **** **********.

** *** **** *******, *** ********* ** ****** *** *** the ****** ********* ****. ***** ************* **** ***** ******* ** cited ** *** **** ******, ** *** ******** ** *********** are *** **********.

*** ****** ********* ** *** ******** ******* (***** **********, ***** padlocks, ******* *****,******** *******, ***) *** ********* ******** ***, ****, ** ******/*-**** *****, with *** '**********' *** ***** *********** ** ** ***.

*** ******** ** *** *** *********** ***** ** ** ** a ************ ****** *** *** ****** ********* ******** ** ***. (see:*** ******** ****** *** ******)

***** *** ***** *** ** **'* ******, *** ** ** a ***-******** ************** **** *********** **** ******** ******** - *** access *********** ** ***** ************.

*******, ************** **** ******** **** ***** ** ******* ** ******** ******** ****. ** **** ***** **** **** *********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Power For Burglar Alarms on Jul 14, 2017
In order to operate, alarm panels require the high voltages found in electrical outlets be converted to the low voltages they run on. In this...
Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
Smartcard Copier Tested (13.56MHz) on Jul 05, 2017
Copying 125kHz cards is certainly easy, as our test results showed, but how about 13.56MHz smart cards? Are they more secure? IPVM focused on the...
H.265 / HEVC Codec Tutorial 2017 on Jun 30, 2017
For years, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...
Access Control Course Winter 2018 on Jun 11, 2017
The Winter 2018 IPVM Access Control Course is now open; save $50 on early registration. IPVM offers the most comprehensive access control course...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...

Most Recent Industry Reports

Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We tested Axis'...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It covers our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...
Hikvision USA Head of Cybersecurity Exits on Jul 18, 2017
Hikvision USA's Head of Cybersecurity has exited the company. In this note, we review the move, share Hikvision's feedback and examine the...
'Suicidal' Knightscope Robot Drowns on Jul 17, 2017
Knightscope continues its hyper growth, at least when it comes to controversy, this time with a 'suicidal' robot in Washington DC. And here is...
March Networks Company Profile on Jul 17, 2017
March Networks was one of the most well-known video surveillance manufacturers of the 2000s. In 2012, March was acquired by Chinese / American...
Milestone Beats OnSSI In Court on Jul 17, 2017
The litigation between former partners Milestone and OnSSI has finished, confirmed by both parties. In April 2016, OnSSI sued Milestone and in...
Power For Burglar Alarms on Jul 14, 2017
In order to operate, alarm panels require the high voltages found in electrical outlets be converted to the low voltages they run on. In this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact