Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognize if they are without their mobile phone.

  • Mobile ID badges for access control
  • Bluetooth Low Energy iBeacon technology
  • Technical challenges

The logical extension is to replace or augment the traditional corporate ID and access control card with a smartphone ID application. There are numerous benefits associated with using a smartphone as an ID badge. Fundamentally, they are more secure because smartphones can be locked, data encrypted and access restricted. Secure ID access can also be remotely installed and activated or deactivated on a smartphone with little effort from the IT or security department. In addition, there is no need to physically visit the security office to get a replacement badge.

Mobile ID Badges And Open Systems

The industry-wide adoption of mobile ID badges has been hindered by the evolution of existing and available technology and the vendor/partner ecosystems that have controlled the technology and markets. For a general application to achieve significant market adoption, it must have the required open systems and technology infrastructure in place and enabled to achieve scalable and secure deployments. Simply put, a mobile ID badge application needs support from the major phone manufacturers and interoperability with existing industry standard security models and protocols established in the market today.

It was not until the promise of near field communication (NFC) that the idea of a mobile ID badge for access control started to take hold as a realistic possibility. After all, if you can replace your credit cards by waving your phone with a digital wallet over a point of sale (POS) device in a retail store, why can’t you replace your corporate ID card for physical access by waving it in front of a door reader?

One major issue that hindered the broad adoption of NFC was the lack of support by major phone manufacturers – specifically Apple with the iPhone - which limited the growth of phone-based mobile IDs for door readers that control physical access.

BLE beacons by design broadcast a unique adjustable signal over a wide range of up to 150 feet
To create a practical smartphone-based mobile ID badge app, there are several technical challenges which must be addressed

BLE Beacons Development

Apple eventually announced a new Bluetooth Low Energy (BLE) iBeacon technology and Google followed suit with its Android-based Eddystone BLE beacon in 2015. BLE beacons are small, low-cost hardware devices that transmit a unique identifier over Bluetooth low energy to nearby electronic devices such as mobile phones. The initial use of BLE beacons were centered around determining location for mobile marketing applications. For example, if a customer is passing a merchandise display, it could notify them of a coupon or sale while they are in the store. Because BLE is universally available on all smartphones, the use of BLE beacons has enabled new experiential smartphone apps based on physical location presence.

In the corporate environment, vendors have quickly determined that there are many ways to leverage BLE to simplify workplace-related functions. These include asset tracking, logging into networks and cloud resources, access to print jobs, meeting room usage, attendance systems, and even employee location tracking.

PACS Two-way Communication And Universal Access

Physical Access Control System (PACS) vendors and security organizations find BLE technology attractive as an access control application because of the two-way communication capability and universal access in smartphones. This is important because the smartphone acts as a reader and can determine presence or location next to a BLE beacon or communicate to a door reader access control device. For this reason, they have quickly determined ways to leverage BLE to enable access control and ID badges for both existing and new PACS solutions. For example, smartphones can be installed with a mobile ID badge application that can communicate with BLE-enabled door readers.

One behavioral challenge associated with this solution is that people today are accustomed to using RFID-enabled access control cards as part of their daily lifespans vendors leverage the technology limits of an access control card read distance (1-3 cm) to the door reader to administer physical access. For example, the location of the reader next to the door or the timing of the read and door access strike opening the door, can all be orchestrated behind the scenes to provide a seamless door entry experience. This is the current user expectation and ensures the proper level of security while reducing tailgating, enforcing badge reads and preventing backups or entry queues. All of this happens transparently to ensure the frictionless access control users enjoy today.

BLE beacons by design broadcast a unique adjustable signal over a wide range of up to 150 feet
The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches

Mobile ID Badge App Challenges

BLE beacons by design broadcast a unique adjustable signal over a wide range of up to 150 feet. While this is ideal for creating mobile ID apps for shopping or presenting location-based notifications and alerts, there are some concerns about when it should be used to provide access control and open a door. The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches. Other key considerations include how to account for multiple doors within close proximity, avoiding a door detection from someone walking behind or away from a door and tailgating events.

To create a practical smartphone-based mobile ID badge app, these technical challenges must be addressed. Some concepts being tested and used today include having a door open acknowledgment response via a notification, or waving the phone or using another gesture to acknowledge that you are in front of a door to request accessible still has some challenges to overcome before becoming the de facto industry standard for mobile ID badge access.

Once the challenges are addressed, it has the potential to drive the next wave of innovation in access control and enable the next generation of ubiquitous mobile ID badge applications that will provide the seamless and secure access control that we enjoy today with traditional ID cards.

Download PDF version

Author Profile

In case you missed it

BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage
BCDVideo Signs OEM Deal With Dell EMC: Positive Impact For Surveillance Storage

In a significant move for the video security market, BCDVideo has announced that it is set to become Dell EMC’s OEM partner in the video surveillance space. For nearly a decade, the Chicago-based company has been known as a key OEM partner of Hewlett Packard Enterprise (HPE), providing storage and networking technology to security integrators on a global scale. This latest partnership will allow BCDVideo to take their offerings to the next level. BCDVideo Vice President Tom Larson spoke to to discuss the reasoning behind the deal, and how the program will benefit partners, integrators, and end-users alike. Expanding BCDVideo's Product Offering For BCDVideo, the HPE OEM program has been widely acknowledged as a success, allowing the company to leverage a globally recognized brand and provide high-quality, reliable solutions across video networking and access control. Nevertheless, explains Larson, HPE server solutions are primarily suited to large-scale enterprise projects, and are therefore unable to accommodate for the growth in small- and medium-sized surveillance applications. The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering, building on success in the larger enterprise market to offer tailored solutions to SMEs. Our aim is to look at all best of breed technology to serve the video surveillance marketplace, and that means multiple partnerships” Support For Integrators By leveraging Dell EMC’s sophisticated digital storage platforms, BCDVideo will now be able to offer a more cost-effective solution to integrators, without sacrificing the resilience and IT-level service that BCDVideo is known for. With access to Dell EMC’s expansive global sales and technical teams, the company hopes to expand its reach, all-the-while providing partners with around-the-clock technical support and a five-year on-site warranty. Customers should be reassured that BCDVideo will continue to offer HPE platforms, service, and support. “Our aim is to look at all best-of-breed technology to serve the video surveillance marketplace, and that means multiple partnerships,” says Larson.  “The addition of Dell EMC to our portfolio is a major win for BCDVideo, for Dell EMC, and for our integrators.” The global collaboration with Dell EMC will allow BCDVideo to open up a broader product offering Meeting Surveillance Market Demands At the technology level, assures Larson, Dell EMC’s server offering is well suited to handle the increasing video resolution and growing camera count demanded by the surveillance industry. At the larger end of the spectrum, the company’s Isilon Scale-Out NAS solution can handle tens of petabytes of data, making it ideal for large-scale security applications such as city-wide surveillance and airport security. Dell EMC storage solutions are already proving successful at major international airports including Dubai and Abu Dhabi, each with a camera count in the 1000s.Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market” For Dell EMC, the new partnership means the ability to expand on this success in the enterprise market, leveraging BCDVideo’s surveillance expertise and high-level customer service to offer tailored solutions for lower-volume applications. Since its inception, BCDVideo has differentiated itself in the security space by providing a high level of IT service to integrators making the transition to IP systems. By combining resources, the partners will be able to service VMS and analytics companies, software vendors, and access control providers, as well as traditional business integrators. Ken Mills, General Manager Dell EMC Surveillance, explains: “Surveillance storage is not just about capacity, it is also about performance and reliability. Dell EMC and BCDVideo together are ensuring our customers get the right solutions designed for the surveillance market.” Accomodating For Growth BCDVideo is well placed to accommodate this anticipated growth. Last year, the company opened a new 51,000-square-foot global headquarters in Illinois, home to 90 separate stations within their Innovation Center where each system is customised according to integrator needs. The new facility allows for expanding business with new and existing partners in the security market.

How To Prepare For Active Shooter Incidents | Infographic
How To Prepare For Active Shooter Incidents | Infographic

This Active Shooter infographic summarises information about trends among active shooter incidents, and outlines how an organization can develop a plan before tragedy occurs, including:   Statistics on the numbers and types of recent active shooter incidents. A profile of common traits among active shooters. How to prepare beforehand, and what to do when the police arrive. How organizational planning ensures maximum preparedness. Pre-attack indicators to look for. Be sure to share this information with coworkers and managers. Awareness is key to preventing active shooter incidents, and to minimising their tragic consequences. When sharing this infographic on your website, please include attribution to More resources for active shooter preparedness: How hospitals can prepare for active shooter attacks Six steps to survive a mass shooting Technologies to manage emergency lockdowns  How robots can check for active shooters  Background checks to minimise insider threats Gunfire detection technologies for hospitals, retail and office buildings 21 ways to prevent workplace violence in your organisation Non-invasive security strategies for public spaces    

How Should Your Security Company Measure Total Cost Of Ownership (TCO)?
How Should Your Security Company Measure Total Cost Of Ownership (TCO)?

How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?