+44(1344 771569) mailtoinfo@acsltd.eu

In our previous article, “The Hidden Risk in Your Access Control: RFID Cloning — and How Mobile Credentials Fix It”, we exposed a critical vulnerability in many legacy access control systems — the ease with which 125 kHz proximity fobs and older RFID cards can be cloned and abused by opportunistic attackers.

But identifying the problem is only half the story. The real value comes from solving it — and mobile credentials are the best way forward for organisations serious about access security.

In this article we’ll explore how **mobile credentials work, why they’re more secure than physical cards, and how Suprema’s solutions help you implement them across your access control infrastructure.


From Cards to Phones: A More Secure Credential

Using a smartphone as a credential isn’t just about convenience — it fundamentally changes how access control works.

With traditional RFID cards or fobs:

  • A static identifier is transmitted by the card
  • That identifier can be read and duplicated
  • A cloned card will open doors just like the original

That’s why systems using legacy cards remain vulnerable — attackers don’t need to defeat locks or alarm systems, they just copy the credential.

With mobile credentials, everything works differently:

  • Credentials are generated and stored securely inside the phone
  • Communication with the door reader happens via encrypted BLE (Bluetooth Low Energy) or NFC
  • The credential never broadcasts a fixed ID that can be stolen
  • Authentication uses encrypted challenge–response protocols
  • Credentials can be issued, revoked, or updated remotely

This combination makes mobile credentials far harder to skim, clone, or misuse.


How Suprema Mobile Access Works

One of the most powerful implementations of mobile access available today is Suprema Mobile Access — a solution designed for both security and seamless user experience.

Here’s what makes it stand out:

✅ Contactless and Intuitive

Users simply tap their smartphone near a reader — just like a card — and the door unlocks. No physical credential to carry, misplace, or hand off.

🔒 Strong Security Backed by ISO Standards

Credentials and communications are protected by robust encryption, operating within an ISO 27001-certified system to ensure secure management throughout the lifecycle.

📶 Dual-Mode Connectivity

Suprema supports both BLE and NFC, enabling broad compatibility across iOS and Android devices and ensuring reliable performance even when screens are off.

🌐 Remote Credential Issuance and Management

Issuing and revoking credentials no longer requires physical contact or manual programming. Administrators can manage everything online, reducing cost, effort, and risk.

📲 Future-Proof and Scalable

Suprema’s system integrates with the BioStar 2 security platform so mobile credentials work alongside other authentication methods like biometrics, smart cards, or visitor credentials — all from a unified interface.


The Business Case: Security, Cost, and Efficiency

Switching to mobile credentials isn’t just about stopping cloning attacks — it delivers tangible operational benefits:

👉 Reduced costs
No more printing, replacing, or managing physical cards.

👉 Lower admin overhead
Remote issuance and revocation simplify credential lifecycle management.

👉 Improved user experience
People almost always have their phone with them — eliminating forgotten cards.

👉 Greater control and accountability
Credential history, access logs, and user rights can be audited and updated instantly.

👉 Eco-friendly solution
Fewer plastic cards mean a smaller environmental footprint.

All of these add up to a stronger security posture and a better day-to-day experience for employees, visitors, and administrators alike.


Integrating Suprema Mobile Access with Your Existing System

One of the common concerns we hear from customers is:

“Do we have to rip out all our readers and controllers to support mobile credentials?”

The good news is: no.

Suprema’s mobile credentials can be deployed alongside existing infrastructure, and in many cases:

  • Existing readers can support mobile access through software or hardware enablement
  • Suprema’s solutions integrate with third-party controllers and systems
  • New mobile credentials coexist with cards and biometrics where needed
  • Mobile access can be issued to specific users without disrupting current operations

This means organisations can transition gradually, securely, and with minimal disruption.


Conclusion: Make the Change That Matters

The risk of credential cloning isn’t going away. Legacy proximity cards will continue to circulate and present a vulnerability until they’re actively removed from the environment.

Mobile credentials — especially when implemented with proven solutions like Suprema Mobile Access — provide a secure, efficient, and future-ready alternative that protects your people, property, and reputation.

If your access control system still relies on physical cards or fobs, now is the time to rethink your credential strategy.


Want Help Assessing Your Access Control Security?

ACS Safety & Security Ltd offers expert analysis, audits, and migration planning to help organisations transition safely to mobile access credentials — whether you’re upgrading an existing system or planning a new installation.

📞 01344 771569 – Contact our team today to discuss the mobile access options that fit your security goals.