PIN keypad, fingerprint biometric, Bluetooth app, WiFi remote, RFID card, and facial recognition — what each method actually does, what fails it, and which is right for your situation.
The access method is the single biggest decision in smart lock selection. Most locks support two or more methods simultaneously — choose your primary method first, then confirm that suitable backups are available. Never rely on a single access method with no fallback.
Enter a 4–8 digit code on a capacitive touchscreen or mechanical push-button pad. The lock validates the code against a locally-stored list and operates the bolt if matched. No internet, no phone, no server — validation happens entirely within the lock.
Anti-peep scramble: Most electronic keypads randomise digit position on each use, making it harder to identify a code from observed finger positions. Look for this feature when comparing keypads for high-visibility installations.
Multiple codes: Most locks support 10–200+ unique codes. Issue different codes to different people — household members, cleaners, tradies — and delete individual codes without affecting others.
Time-limited codes: Most connected systems support codes that only work within a specified date/time window. Essential for Airbnb and tradie access.
Forgotten code: Always configure a second access method. A physical key override eliminates this as a lockout risk.
Battery flat before warning noticed: Most locks have a 9V jump-start port — keep a 9V battery at the property. Replace batteries at first low-battery warning.
Keypad surface worn: Capacitive surfaces degrade with heavy use over years. Not a short-term concern for residential use.
Lowest battery impact of any electronic method. The keypad activates only when touched. Offline PIN locks often achieve 12–18 month battery life.
A capacitive or optical sensor reads the fingerprint ridge pattern and compares it against enrolled profiles stored locally in the lock. On a good sensor, authorised fingers unlock in under 0.5 seconds. The stored data is a mathematical template — not a photograph — and cannot be reverse-engineered to reproduce a fingerprint.
Enrol multiple fingers: Always enrol both index fingers at minimum. Enrol thumbs and other fingers as backups. If one finger has a cut, the others work. Enrol each finger in multiple positions — the sensor reads a partial print, not a whole-hand press.
Enrol key people: Enrolled profiles can be named and individually deleted. Household members can each have their own profiles — and their access can be revoked without affecting others.
Wet or dirty fingers: The most common failure. Wet hands from rain or washing degrade optical sensor reads significantly. Capacitive sensors handle moisture better than optical. Test your lock in wet conditions before relying on it as a primary method.
Cuts or skin changes: A deep cut across a fingerpad can prevent recognition until healed. Seasonal skin changes (very dry winters) can also affect accuracy. Always have a PIN backup active.
Young children: Small fingers and rapidly changing prints in childhood make fingerprint less reliable for under-10s. Use a PIN for children.
Moderate — the sensor uses power on each read. Slightly higher battery consumption than PIN-only but not significantly so for residential use.
Bluetooth Low Energy (BLE) communicates directly between your phone and the lock when within approximately 5–10 metres. The lock authenticates with your phone — no internet or server involved. Works during WiFi outages and power outages as long as the lock's batteries and your phone battery are charged.
Auto-unlock (hands-free): Some locks support proximity detection — the door unlocks as you approach with your phone. Convenient but introduces a consideration: if your phone is near the door without you (left on the step, in a bag by the door), the door may unlock for whoever picks it up.
Phone battery dead: Bluetooth fails with a dead phone. Always have a PIN or fingerprint backup configured.
Bluetooth turned off: Simple to fix — but can catch users out after a phone restart.
App update required: Occasional app updates can temporarily break Bluetooth pairing until the update is applied.
Low — BLE is designed for minimal power consumption. A Bluetooth-only lock without WiFi gateway can achieve 12+ month battery life on AAs.
A gateway hub (or built-in WiFi radio) connects the lock to your home network. You control the lock from anywhere via the manufacturer's app — unlock, lock, issue codes, revoke access, and receive push notifications when the door is opened or a code is used.
Gateway vs built-in WiFi: Most locks connect via a separate gateway hub (Bluetooth to the lock, WiFi to your router). Some premium models have WiFi built in and don't need a gateway. Built-in WiFi is simpler; a gateway hub allows multiple locks to share one WiFi connection.
Internet outage: Remote access fails. Local methods (PIN, fingerprint, Bluetooth) still work.
Server outage: The manufacturer's cloud server can go down — rare but possible. Local methods continue to work.
2.4GHz / 5GHz band merge: The most common setup problem. All smart lock gateways use 2.4GHz only. If your router merges both bands under one network name, the gateway may fail to connect. Fix: give your 2.4GHz band its own SSID. See Chapter 08.
Significant — WiFi radio staying active uses 30–50% more battery than offline operation. Expect 6–9 months instead of 12+ months on AAs.
RFID cards and fobs use the 13.56MHz MIFARE standard used in most Australian smart locks. The card contains no battery — it draws power inductively from the reader when tapped, making cards essentially maintenance-free and very long-lived.
Cards are enrolled in the lock's memory and can be individually deactivated without affecting other cards. On connected systems, this can be done remotely — immediately revoking a lost or stolen card without needing physical access to the lock.
Lost card: Deactivate immediately via app. No re-keying required — other cards are unaffected.
Card proximity to strong magnets: Modern RFID cards are more robust than older versions, but storing near strong magnets or RFID-blocking wallets can occasionally cause issues.
Card compatibility: Most smart locks use MIFARE Classic or MIFARE DESFire. Confirm the card format matches if you want to use existing facility cards.
Very low — RFID reads are brief and infrequent. Minimal battery contribution compared to WiFi or high-frequency fingerprint use.
2D recognition uses a standard camera to compare facial geometry against stored images. It can be spoofed with a high-quality photograph in some conditions — not recommended for high-security applications.
3D recognition (Yale Luna Pro+, Vault Zenith) uses structured light projection — an infrared dot array maps the depth geometry of the face. Cannot be spoofed with a flat photograph. Works in complete darkness. The same technology as Apple Face ID.
See Chapter 06 for the full facial recognition chapter.
Significant facial changes: Major weight change, surgery, or significant beard growth can reduce recognition accuracy and require re-enrolment.
Privacy Act considerations: Facial geometry is sensitive information under Australian law. For commercial applications, consent and privacy policy requirements apply. See Chapter 06.
Higher than fingerprint or PIN due to the IR projector and camera system. Expect noticeably shorter battery life than equivalent non-facial-recognition models. Manageable with quality batteries and battery monitoring.
| Method | |||||
|---|---|---|---|---|---|
| ✓ Yes | ✗ No | ✗ No | Low | Guests, rentals, universal | |
| ✓ Yes | ✗ No | ✗ No | Low–Medium | Primary residents | |
| ✓ Yes | ✓ Required | ✗ No | Low | Phone-first users | |
| ✗ No | ✓ Required | ✓ Required | High | Airbnb, remote access | |
| ✓ Yes | ✗ No | ✗ No | Very Low | Strata, offices | |
| ✓ Yes | ✗ No | ✗ No | Medium–High | Premium, accessibility |
Tell us about your household, your door, and how you actually use your front door — and we'll recommend the right primary and backup methods for your situation.