Using Bluetooth-enabled Devices as the Key to Remote Monitoring

Bluetooth technology is commonly used in a variety of applications to sync intelligent devices such as smartphones, wireless headsets and health trackers, to networked computers. As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security as well.

Automotive manufacturers and home security providers are already using Bluetooth-enabled devices, such as smartphones, as a means of granting access control to cars and buildings, and replacing traditional mechanical keys, keypads and RFID fobs. When combined with an electronic lock or latch, Bluetooth controllers provide an additional layer of security to enclosure applications where remote access and monitoring are critical. Bluetooth controllers accept an encrypted Bluetooth wireless electronic “key” from a Bluetooth-enabled device and provide secure access to a connected electronic lock.

Combining Bluetooth with Electronic Locks

With over six billion connected devices in operation today, the ability to use a Bluetooth-enabled device as a key offers some interesting opportunities for physical security.

Access control typically falls under one of three categories:

  • Something you have (a key or RFID card),
  • Something you know (a pin) or
  • Something that is uniquely you (a fingerprint).

Smartphone-based access provides all three. An individual has their device, keys in a pin to send an unlock signal, and one could argue that cell phones, as they are used today, are as unique to the individual as a biometric trait. In fact, many smartphones today provide fingerprint access as an option for login.

Most everyone carries a Bluetooth-enabled cell phone with a unique ID, so why not use it as a key? Bluetooth lock controllers offer a significant advantage over traditional mechanical locks. Compared to lock-and-key systems that have the potential for keys to be misplaced or stolen, electronic keys can be added and deleted electronically in real time, as needed. Securing enclosures with these electronic access solutions helps eliminate physical key inventory and distribution, and ensures that only authorized personnel have access to sensitive equipment and information.

Simplified Remote Access and Monitoring

A significant benefit of the smartphone-based Bluetooth access control system is the ability to leverage the cloud to wirelessly control and monitor access to secure areas and the equipment housed within. Applications can be run on smartphones that link to a remote server though cloud based networks. This provides convenient wireless credential management and access monitoring, without having to physically wire into existing networks.

These systems can also link to existing building security systems, allowing full monitoring of access throughout a facility, down to the equipment that is outfitted with intelligent locking systems. Credentials can be managed from a single application to provide enterprise-wide access control. When a secured space or enclosure is accessed, a signal is sent to a monitoring system to confirm and log access. The security administrator also has the ability to easily add and remove access through networked software and applications that connect with end user’s Bluetooth-enabled devices. This creates an efficient process for generating physical security audit trail reports to meet security compliance requirements.

Choosing the Appropriate Mode of Operation

Standalone operation requires credential programming and audit trail retrieval via a direct (wired or wireless Bluetooth) connection to the controller from a host computer using downloaded administration software. This solution does not require a smartphone connection to the cloud for access, although the Bluetooth-enabled phone must be physically presented to the reader for programming.

Bluetooth controllers offer different modes of operation depending on the requirements of the application. Mobile applications available for download can be used to provide one-touch access when a mobile device is within proximity of that lock controller. There is a one-time enrollment that takes place during the installation of the mobile application; from then on, the web based application controls access to the Bluetooth reader.

Cloud-based apps are available for smartphones that provide a simple means of enrolling a phone as a valid access credential, eliminating the need for the lock controllers to be wired to a network for remote access control and monitoring.

Security administrators can access specialized, web-based applications that sync user Bluetooth devices to specific Bluetooth readers based on the device ID. This enables remote, time-based access by any smartphone by simply placing the Bluetooth device within a preset proximity to the reader. Credential management and access monitoring takes place through the cloud network without any action on the part of the user.

Next Generation Access Control

As Bluetooth-enabled smartphones continue to proliferate as a standard means of connecting and communicating between devices, a natural progression will be the use of wireless cell phones as electronic keys. The ubiquitous and very personalized nature of cell phones has made them the ideal credential for physical access control – something each individual has, something they know and something unique to the individuals themselves.

About the Author

Steve Spatig is general manager of Southco’s Electronic Access Solutions Strategic Business Unit and has over 15 years of experience working in various design engineering and product management capacities with the company.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.