Sidebar: The Search for the Perfect Electronic Key
Computerworld - Today's magnetic card key systems are popular with hotels and resorts because they're flexible and cheap. The door lock systems run off batteries in stand-alone mode -- no power or data links are needed. Operation is simple. Keys can easily be replaced. The door lock is smart enough to store information about who has accessed the room and at what times, leaving an audit trail for security personnel. And the systems are self-maintaining as long as the battery lasts. It simply rolls forward to the next lock combination each time a new key is entered or the current one expires. However, the lock mechanism itself cannot be updated or reconfigured without visiting the room.
Electronic lock companies and hotels are experimenting with other security key devices, including biometric fingerprint readers, smart cards, and proximity cards that allow the guest to unlock the door without touching the lock. Vendors are also experimenting with infrared and other wireless technologies.
Proximity card readers haven't been well received because they can be used to track where guests are in the hotel at any given time. Experimental systems have been deployed where an RFID chip was embedded in frequent-guest cards, says Brian Garavuso, CIO at Hilton Grand Vacations Co. and chairman of the American Hotel and Lodging Association's technology committee. "[Guests] were uncomfortable with us knowing where they were at any given time," he says. "It didn't go beyond the conceptual stages."
Glenn Peacock, director of marketing at lock system vendor Saflok in Troy, Mich., says his company's door locks can be used with memory cards and smart cards as well as with magnetic stripe cards. However, biometric fingerprint readers have been a bust so far. These systems read a fingerprint when the guest checks in and generate a unique algorithm that's used to authenticate the user and open the door. Although no thumbprint data is stored, he says users don't like the idea of being fingerprinted. "The American society is reluctant to have their fingerprints scanned," he says.
Cost and ease of support are two of the biggest factors to consider when choosing a door lock system, says Jocelynn Lane, vice president at VingCard AS in Norway.
VingCard's sister company Timelox AB in Landskrona, Sweden, has installed smart card technology in hotels such as The Venetian and Bellagio in Las Vegas and some Starwood properties, and VingCard plans to introduce its own RFID cards in 2006, Lane says. In this system the door lock establishes an infrared connection to the wall thermostat and tunnels through the energy management system
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts