RFID? NFC? BLE? What do they mean?

Share

Related articles

What standard do you want to integrate card readers for access control? Choose between RFID, NFC or BLE solutions! These are two phrases you will never hear from us in this form, as very few people know exactly what wireless identification options are available in today's world and what the difference is between them. In this article we will explore this question.

 

Let's start at the beginning. We live in a world where employees don't want to walk around with jangling key fobs, don't want to hand in their office key at the reception (or have to turn it in annoyed if they forget it). What's more, we live in a world in which we increasingly dislike using cash. Whether it's card payment or access control, these three standards - RFID, NFC or BLE - are the solution to the problem of having computer systems triggered by the touch or approach of a single card to carry out the desired transaction (payment or even opening a door).

RFID (Radio Frequency Identification)

It is a very common method, as the bank card in your pocket is probably based on the same principle. In practical terms, it requires a radio-frequency transmitter (in the trade and in English: tag), or ‘tag’ (the microchip in a bank card, access card or other type of ID, for simplicity we will call it ID for short) and a ‘reader’ (such as a bank card terminal or a reader next to the door).

The most common one is the so-called passive RFID: when the ID is touched (brought close) to the reader, the radio frequency signal emitted by the reader induces a current in the ID, which is sufficient to send the information stored on the ID back to the system (which then recognises, based on the codes ‘hidden’ in the ID, whether the user is authorised to enter or to pay the amount of money).

There is also semi-passive and active RFID, where the ID contains a small battery so that it does not need to take energy from the reader. It reacts faster and more reliably. The latter has a more serious built-in power source, which means a longer reading range and larger memory capacity. Typically, the lifetime of such an active RFID tag is 8-10 years. Due to its size, price and maintenance requirements, it is not widely used today and is only used in specialised areas.

Thus, at the time of entry, this type of identification works by the employee approaching an RFID tag (card, watch ID, key fob, etc.) to a reader. The reader induces a current to operate the passive ID, reads the data from the ID, sends the data to the access control system, which verifies access authorization and opens the door. All this takes a few seconds at most.

NFC (Near Filed Communications)

At first glance, and only in terms of its use in access control systems, it could be similar to RFID, but it is a different technology. In essence, this technology is already part of mobile communications, as newer smartphones and tablets already support it.

The way it works is that you have two NFC-enabled devices, and when you touch them (bring them closer together), they start communicating. In everyday life, the best-known use is also related to payment, when you touch your phone to the card reader instead of your credit card and the payment is made in the same way, but also PayPass payment systems.

This communication does not require a pairing code or a prior login, as with RFID, there is the possibility of passive and active communication. For example, a chip in a sticker, chip, card or whatever can be used to create a so-called NFC tag (identifier), on which you can place (or approach) the smartphone and a communication is initiated. In this case, the chip performs a passive function, while active communication can take place when two mobile phones perform a task between them.

On entry, this type of identification works as if the phone were the card, in which case the NFC-enabled mobile phone acts as the identifier.

BLE (Bluetooth Low Energy)

This solution can be used to connect devices at a distance of around 8-10 metres. It is known that classic Bluetooth connections consume a lot of energy, but BLE is a more energy-efficient version of this. It can also be used for identification and access control when using RFID readers that support BLE.

For example, BLE can be used to connect newer smartwatches to smartphones (e.g. to transmit heart rate or step data from the watch to the phone), or wireless headphones.

Of course, it also has a major advantage in access control, allowing smartphones to be used as a means of identification with great freedom. This is also possible with NFC, but in the case of iPhones, the NFC mode of operation is complicated at the operating system level, and for a long time it could not be used at all for this purpose. For this reason and other advantages, leading companies in the access control market have developed BLE-compatible readers. The technology allows applications ranging from the extremely convenient to the highly secure.

It is possible, for example, to only unlock the smartphone (e.g. by biometric, PIN or passcode identification) before reading it at the access control system, which provides extreme security through fast but two-step identification. Simpler identification methods are also possible. You can set a pothole mode or a remote read mode, which allows you to enter either with a smartphone in your pocket or unlock a door or barrier from several metres away by pressing a button in the app.

To sum up: which is the better solution?

The best solution for a given location depends on the security and convenience requirements and the specific access tasks. Anteus' MaxReader solution offers a flexible and convenient solution for each form of identification. Whether it's a card, special ID, mobile ID, high security or low cost solution, MaxReader is an excellent choice for Android, iPhone and without a smartphone.

Contact us for more information and let's discuss how your access control system can be brought up to date.

Did you like the article?
Share it with your friends!

What to do if you want to try
a system?

Fill in the form.
Pay particular attention to the correctness of the e-mail address.
After entering your details, you can access the OfficeControl DEMO page, where you can familiarise yourself with all the functions of the system using the pre-set interface and templates. Feel free to stop anything, the preset demo data is automatically reset every hour.
If you would like to learn more about the system after you have seen the preconfigured demo interface, you can take advantage of a 30-day free trial. Then you get a full-fledged interface that no one else has access to, and you can customise and test the system with your own data and settings. Important! This testing requires more time, because there is no sample data uploaded in advance to allow full testing. You will be given a blank space so you can test all settings and customizations. A 30-day trial is available on the public demo interface.

We are happy to help you to prepare high quality plans for your project!

Ask for a quote or enquire! Our engineers will be happy to help.

You can count on us for any questions related to access control systems.

Request a quote or inquire. Our engineers will be happy to help.