Exclusive: Providing next-level access control


Share this content


State-of-the-art mobile authentication solutions are helping companies to improve security and productivity, reports ELATEC.

Modern access control systems are much more than simple door openers. This is especially true when it comes to mobile authentication solutions. If they are perfectly tailored to the requirements of a company, they have the potential to make everyday tasks considerably more convenient and secure. At the same time, they can reduce costs. However, companies are often hesitant to introduce such a future-proof solution—especially if a wide variety of technologies are already in use. But with the right expertise, successful integration of RFID and mobile access solutions is possible.

In the area of access control, mobile credentials are steadily gaining importance. The digital credentials on smartphones, tablets or wearables are always at hand and are thus an ideal supplement to conventional ID cards or keyfobs.

It is possible to use mobile credentials based on NFC (Near Field Communication) or BLE (Bluetooth Low Energy) technologies, which the majority of mobile devices are equipped with. The international transmission standard NFC allows the contactless and secure exchange of data over a short distance. The transaction is thus processed when the smartphone is in the vicinity of a multi-frequency RFID (Radio Frequency Identification) reader. With the particularly user-friendly BLE radio technology, on the other hand, the smartphone no longer has to be actively held up to the reader for the authentication process.

Companies benefit in several respects if they add mobile authentication solutions in the course of advancing digitalisation in Physical Access Control, or PAC for short. On the one hand, the effort and costs involved in managing credentials are reduced. At the same time, the convenient handling saves employees time and increases their productivity.

Customised solutions through holistic consulting

Successful implementation can be a challenge. This is especially true if different technologies and credentials have already been introduced over the years. Customised solutions are needed here. After all, a medium-sized company with affiliated production facilities must solve different challenges with an access system than a multinational corporation with properties in several countries.

To ensure that the introduction of an access control system is a success, companies should pay particular attention to the future-proofing and flexibility of the solution as well as the security of the overall system. Above all, however, it is advisable for companies to first seek the advice of experts who have experience in authentication processes before making an investment decision.

Comprehensive pre-sales consulting from appropriate solution providers includes an analysis of the current situation and requirements as well as documentation of the results. Optimal consulting also includes a feasibility study, proof-of-concept and a project and rollout plan. During the implementation phase, solution providers handle hardware and software integration, application development, configuration and all customisations, as well as testing and protocol verification.

During the transition to an access control system that also supports mobile authentication solutions, companies do not have to sacrifice the functionality of their access and access control: multi-frequency readers allow a smooth migration as they support RFID as well as NFC and BLE. This ensures that all transponders can be used continuously, from the mobile end device to the card ID to the keyfob.

Future-proof from initial integration

Requirements and IT infrastructures change over time—and so does the overall system. Companies should therefore ensure that technical support does not end with the initial integration. Only a flexible system that provides for optimisation, adaptation and upgrades is future-proof. Companies should therefore ensure that solution providers offer their customers software development kits in addition to expert support. With these, the products delivered in standard configuration can be easily adapted, either by the company itself or by the solution provider—even remotely.

Flexibility for internationally operating companies

The integration of access control systems is particularly complex in an international context. Companies with subsidiaries in several countries or even on different continents often use different transponder technologies from location to location.

In order to nevertheless enable simple and fast access for the company’s own employees, but also for temporary visitors, a flexible solution is required. Readers are available on the market that use RFID, NFC and BLE for authentication and access control and are also suitable for international use. The readers from solution provider ELATEC, for example, are compatible with up to 60 transponder technologies and certified for sale in up to 110 countries worldwide.

A uniform solution pays off particularly well for companies that operate internationally. On the one hand, conventional transponders such as cards or keyfobs can be used universally at all locations. On the other hand, central remote maintenance of digital credentials involves little effort. They are implemented directly on the user’s smartphone and can be easily blocked in the event of loss or theft and reinstated when the phone is replaced.

Security: A question of the overall system
Access control systems serve to protect people and assets. To ensure this, the systems themselves must be secured against manipulation. This is because security gaps pose an enormous risk—especially in the age of digital transformation.  

When selecting a reader as a central component of an access solution, care must be taken to ensure that it supports the credentials and encryption algorithms appropriate for the application’s security level. In addition, the physical security of the reader must be considered to prevent tampering. In this context, solution providers such as ELATEC not only offer the appropriate products, but also comprehensive consulting services that go beyond the reader itself. The experts cooperate closely with system integrators and support them by identifying the optimal authentication solution. The system integrators can thus concentrate on their core business.

However, in order to effectively and holistically secure an RFID-based system such as an access control system, it is not sufficient to consider the reader alone. It is necessary to include the entire system in the company’s security concepts in advance. This is a complex process that, in brief, proceeds as follows: based on a real existing or feared threat scenario, a protection concept is developed, which forms the basis for the implementation of the specific protection. This can be achieved by a technical element as well as a procedure or process. In any case, the following applies: security must always be related to the overall system.


First and foremost, access control systems are essential for corporate security. They are designed to ensure that only authorised persons are granted access to sensitive areas. But especially in combination with smartphone-based badge solutions, they can do more: they provide considerable relief for employees and thus increase their productivity and satisfaction. The decision in favour of a modern access control system can have a positive effect on the company that goes far beyond the aspects of security and reduction of costs and administrative effort.

For more information, visit: www.elatec-rfid.com/int/

This article was originally published in the November 2021 edition of International Security Journal. Pick up your FREE digital edition here

Receive the latest breaking news straight to your inbox