Business Security

Is Smartphone Access Control a Better Option for your Organization?

Published
View from balcony above busy office building lobby.
Is Smartphone-enabled Access Control a better option for your organisation?

In this blog, we share everything you’ll need to know to get your head around the uses and benefits of smartphone access control. We’ll cover:

  • What is smartphone access control?
  • How do smartphone-enabled access readers work?
  • What are the benefits of using smartphones for access control?
  • Frequently asked questions about smartphone access control

What is smartphone access control?

For many years, access control with proximity cards and fobs using RFID (Radio Frequency Identification) have been the most widely used method for users (employees, visitors, guests) to provide their credentials when entering an access-controlled area. It makes sense, as cards and fobs have proven to be reliable so far and the process of using one usually takes a fraction of a second.

But there are still challenges in using cards and fobs to control access and concerns have been raised, most commonly, about people losing them or fears of cloning. Many organizations are now looking for a more agile and potentially more secure way to control the flow of people in and around their premises – whether that may be a shop, office block, public sector building, or large industrial plant.

Enabling employees to use access control with their smartphone instead of cards or fobs can offer many additional benefits while maintaining at least the same level of speed and reliability.

How do smartphone-enabled access control readers work?

Smartphone enabled readers look similar to typical card or fob readers and they are also capable of reading various formats of traditional cards and fobs, as well as smartphone credentials. Smartphone enabled access control readers work with the help of a smartphone app. Of course, the main point of difference from traditional readers is how they’ll be used.

Thankfully, using your smartphone credentials is as easy as 1-2-3:

  • The user downloads a small app from the Google Play Store (Android) or Apple App Store (iPhone). 
  • On first launch the app will generate a random and unique ID, which can be entered into the access control system against the employee/keyholder record.
  • The employee can now present their phone to the reader much like a traditional card or fob.

More advanced service options can also offer additional functionality and convenience, especially for busy sites or areas with heavy foot-traffic:

  1. Tap-Tap mode – The user leaves their smartphone in their pocket, approaches the reader, and taps the phone firmly twice. This can improve the time taken to gain access to an area as users don’t have to search their pockets for their card or fob or remove a wallet, purse, or a set of keys. It can also help in areas where there may be a higher risk of a phone being snatched away – for example, by an attacker outside a door that leads to the street.
  2. Slide mode – The user leaves their phone in their pocket or bag and places their hand close to the reader. A similar convenience to tap-tap but provides support to those who don’t have pockets that fit their phone or choose to keep their phone in a bag.* 
  3. Hands-free mode – The user simply approaches the reader with their smartphone on their person or in their car. The range can be configured on a per-reader basis. This is ideal for car park barriers where the phone can be left in its charging cradle and the employee simply drives up to the barrier without having to touch the phone.
  4. Remote mode – The user presses a button on the phone screen to activate the reader. This is perfect for receptionists to remotely open a door for a visitor without having to wire in a release button to their desk.

As you can see, each of the above methods can provide additional convenience for users and the business. Your site can benefit from a more agile set-up too, as the reader can also be configured to enable or disable each feature as required. 

For example, the remote mode might only be enabled for the reception door, the hands-free only enabled for the car park barrier and main entrance, and all of the four modes above may be disabled for the server room meaning the few people who access that room have to present their phone or a card or fob to the reader.

Access points are Bluetooth enabled

The communication between the reader and the smartphone is via Bluetooth Low Energy (BLE), which has a negligible effect on battery life of the smartphones. BLE only consumes energy when being actively used and even then, it is only between 1% and 3% of battery life per day. Users do not have to pair their phones with the readers.

Woman using keyless access control on her smartphone.

What are the benefits of using smartphones for access control systems?

There can be many benefits to using smartphone access control depending on your unique needs and the solutions you choose. However, here are some of the main way that you could benefit:

1. Improved security

It can be common for employees to lend their card or fob to another colleague or a visitor. This can present a security risk as it may grant the visitor the same access permissions as the employee and any access event will be falsely attributed to the employee who loaned them their card. 

Users less likely to lend someone their smartphone (especially a stranger) because it will likely contain photos and other personal information.

2. Per reader security settings

Each reader can be configured to require the phone to be unlocked or not. Requiring the phone to be unlocked can provide dual-factor authentication for additional security.  

3. Supporting a safer workplace

Using smartphones instead of typical PIN or fingerprint readers can help to reduce the risk of spreading germs and disease in your site.

4. More convenience for employees

Smartphones have become ubiquitous and most people carry them on their person whenever they are away from their home. It is therefore convenient to use the device they are already carrying instead of adding another card or fob to carry and remember. The advanced options mentioned earlier also provide additional convenience, especially when the users are carrying objects.

5. Reduce wasting time on lost fobs/cards

As we’ve mentioned, it is common for employees to forget to bring their card or fob. Typically, these employees will ask the administrator of the access control system for a temporary card for the day. These cards will then need to be handed back in, and if not, the administrator will have to contact the employee.

This can waste time for the administrator and the employee. Employees are much more likely to remember to bring their smartphone with them and will turn back to get their phone if they realise that they don’t have it on the way to work!

6. Remote issuing of credentials

Cards and fobs must be handed to or posted to the user. On the other hand, the smartphone credentials can be sent via email or the user can read the free credential number over the phone to the administrator. The user can arrive on site for the first time and immediately have the appropriate access permissions.

7. Card cost and environmental impact

The smartphone enabled readers offer free credentials and the paid-for credentials can be recalled remotely by the administrator and issued to another user without wasting plastic – supporting a more environmentally friendly solution.

On the other hand, cards and fobs must be purchased and issued to employees and are frequently not handed back in for reuse, which has a financial cost and impacts the environment through plastic waste.

8. Cloning protection

Last but by no means least, smartphone credentials are clone resistant. While some formats of cards/fobs do offer clone resistance, the majority can be cloned relatively easily.

Frequently asked questions about smartphone access control

Take Action Today on a Smartphone Access Control System For Your Business 

Now you know what a smartphone access control system looks like, how it works, and what the benefits are. So, what do you need to do next? A Securitas Technology expert will be happy to guide you through the process of planning and implementing a smartphone-enabled access control system on your site, whether that’s an upgrade or a new system built from scratch.