Using Bluetooth-enabled Devices as the Key to Remote Monitoring

Bluetooth technology is commonly used in a variety of applications to sync intelligent devices such as smartphones, wireless headsets and health trackers, to networked computers. As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security as well.

Automotive manufacturers and home security providers are already using Bluetooth-enabled devices, such as smartphones, as a means of granting access control to cars and buildings, and replacing traditional mechanical keys, keypads and RFID fobs. When combined with an electronic lock or latch, Bluetooth controllers provide an additional layer of security to enclosure applications where remote access and monitoring are critical. Bluetooth controllers accept an encrypted Bluetooth wireless electronic “key” from a Bluetooth-enabled device and provide secure access to a connected electronic lock.

Combining Bluetooth with Electronic Locks

With over six billion connected devices in operation today, the ability to use a Bluetooth-enabled device as a key offers some interesting opportunities for physical security.

Access control typically falls under one of three categories:

  • Something you have (a key or RFID card),
  • Something you know (a pin) or
  • Something that is uniquely you (a fingerprint).

Smartphone-based access provides all three. An individual has their device, keys in a pin to send an unlock signal, and one could argue that cell phones, as they are used today, are as unique to the individual as a biometric trait. In fact, many smartphones today provide fingerprint access as an option for login.

Most everyone carries a Bluetooth-enabled cell phone with a unique ID, so why not use it as a key? Bluetooth lock controllers offer a significant advantage over traditional mechanical locks. Compared to lock-and-key systems that have the potential for keys to be misplaced or stolen, electronic keys can be added and deleted electronically in real time, as needed. Securing enclosures with these electronic access solutions helps eliminate physical key inventory and distribution, and ensures that only authorized personnel have access to sensitive equipment and information.

Simplified Remote Access and Monitoring

A significant benefit of the smartphone-based Bluetooth access control system is the ability to leverage the cloud to wirelessly control and monitor access to secure areas and the equipment housed within. Applications can be run on smartphones that link to a remote server though cloud based networks. This provides convenient wireless credential management and access monitoring, without having to physically wire into existing networks.

These systems can also link to existing building security systems, allowing full monitoring of access throughout a facility, down to the equipment that is outfitted with intelligent locking systems. Credentials can be managed from a single application to provide enterprise-wide access control. When a secured space or enclosure is accessed, a signal is sent to a monitoring system to confirm and log access. The security administrator also has the ability to easily add and remove access through networked software and applications that connect with end user’s Bluetooth-enabled devices. This creates an efficient process for generating physical security audit trail reports to meet security compliance requirements.

Choosing the Appropriate Mode of Operation

Standalone operation requires credential programming and audit trail retrieval via a direct (wired or wireless Bluetooth) connection to the controller from a host computer using downloaded administration software. This solution does not require a smartphone connection to the cloud for access, although the Bluetooth-enabled phone must be physically presented to the reader for programming.

Bluetooth controllers offer different modes of operation depending on the requirements of the application. Mobile applications available for download can be used to provide one-touch access when a mobile device is within proximity of that lock controller. There is a one-time enrollment that takes place during the installation of the mobile application; from then on, the web based application controls access to the Bluetooth reader.

Cloud-based apps are available for smartphones that provide a simple means of enrolling a phone as a valid access credential, eliminating the need for the lock controllers to be wired to a network for remote access control and monitoring.

Security administrators can access specialized, web-based applications that sync user Bluetooth devices to specific Bluetooth readers based on the device ID. This enables remote, time-based access by any smartphone by simply placing the Bluetooth device within a preset proximity to the reader. Credential management and access monitoring takes place through the cloud network without any action on the part of the user.

Next Generation Access Control

As Bluetooth-enabled smartphones continue to proliferate as a standard means of connecting and communicating between devices, a natural progression will be the use of wireless cell phones as electronic keys. The ubiquitous and very personalized nature of cell phones has made them the ideal credential for physical access control – something each individual has, something they know and something unique to the individuals themselves.

About the Author

Steve Spatig is general manager of Southco’s Electronic Access Solutions Strategic Business Unit and has over 15 years of experience working in various design engineering and product management capacities with the company.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.