Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnAccess ManagementEducation:University

Using Smartphone-Based Access Control to Keep Students Happy

By Diane Ritchey
December 1, 2014

Vanderbilt University has earned many distinctions, includingPrinceton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.

            HID and the school recently tested smartphones to open doors at one or more of six possible campus entry points, including one parking garage. Entry points were equipped with mobile-enabled iCLASS SE readers that were configured to work with existing iCLASS smart cards as well as HID Global’s Mobile IDs. Mark Brown, Manager, Commodore Card Office at Vanderbilt University, explained the process.

 

Why did you decide to do the pilot?
We had seen the NFC pilots in the past but were excited to see a solution that didn’t require additional hardware to work on a wide range of handsets. With an existing iCLASS deployment,  this opportunity seemed like a natural progression for us.

 

What did you hope to get out of the pilot? What were your goals?
We really wanted to see if the solution was as easy to use as it sounded in theory. Unless the alternative to using your card is as easy and convenient then in the longer term I just don’t see people using it. It also had to be secure and easy to administer. The pilot certainly met these goals.

 

How does the system work if the power goes out?  
Our door access is all on battery backup and then fail-over generators so in the case of power failure the users can still get into buildings. (As a side note, says Debra Spitler, Vice President Strategic Alliance for HID: “Please note that when using a smartphone for mobile access, the device itself must have (battery) power in order to start the communication between the smartphone and the reader. Most testers report little to no change in battery life on devices that are supporting the HID Mobile Access App.”) 

 

What has been the reaction from the students who are using it?
They love the convenience – rather than having to dig out their ID cards they just use their phones, which in most cases are already in their hands, to “Twist and Go” as they approach the door. They also like the “cool factor” of being able to open a door with their phone.

 

What specific actions are you or HID taking to ensure smartphone security with this endeavor?

The handsets can allow a variety of security options from within the Mobile BLE app. With our wireless network students are required to use a PIN/passcode to lock the device so this also increases security. (Spitler adds: “Mobile Access offers many layers of security. Two such examples include the fact that mobile IDs are stored in an area of the device that has been designed for the storage of sensitive information. In addition, we are not storing the credential directly, but rather Seos SIOs (Secure Identity Objects).  These are NIST Suite B encrypted and are tying the diversified key (no master key) to the device, so that it will not work on another device. Also, the transaction between phone and reader is not dependent on NFC or Bluetooth Smart security. HID encrypts the data on top and also employs tamper detection, so that we know if sniffing attempts are being made. In addition, the device can be set up with a passcode, so that if lost, it cannot be used to enter the building.”)

 

What other applications do you see this project being applicable for? Where do you see is security with your university headed with mobile phones?

Parking gates are a great use of the “Twist and Go” feature because of the way the range can be defined when the reader is programmed. Also office suites and meeting spaces are ideal especially as we don’t require staff to display their ID cards, but they rarely go anywhere without their phones! In terms of other applications other than physical access control, we would love to see readers available for vending, point of sale, laundry – in fact, anywhere there is currently a card reader.   

KEYWORDS: smartphone access smartphone security student safety University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Catering to Happy Employees with Cloud Computing

    See More
  • SEC0519-talk-Feat-slide1_900px

    How to Keep Your Top Performers from Leaving

    See More
  • SEC1119-talk-Feat-slide1_900px

    Vaping and Students: Enterprise Security Needs to Lead the Charge

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing