← Return to website
Smart Lock Buyer's Guide ← Back to Guide Index
Chapter 03 — How You'll Unlock It

Smart Lock Access
Methods Explained

PIN keypad, fingerprint biometric, Bluetooth app, WiFi remote, RFID card, and facial recognition — what each method actually does, what fails it, and which is right for your situation.

6 Methods Covered Failure Modes Included Comparison Table

The access method is the single biggest decision in smart lock selection. Most locks support two or more methods simultaneously — choose your primary method first, then confirm that suitable backups are available. Never rely on a single access method with no fallback.

Method 01
PIN Keypad
PIN / Keypad
Enter a code — works entirely offline, no device required
Works Offline No Phone Needed Most Versatile

How it works

Enter a 4–8 digit code on a capacitive touchscreen or mechanical push-button pad. The lock validates the code against a locally-stored list and operates the bolt if matched. No internet, no phone, no server — validation happens entirely within the lock.

Anti-peep scramble: Most electronic keypads randomise digit position on each use, making it harder to identify a code from observed finger positions. Look for this feature when comparing keypads for high-visibility installations.

Multiple codes: Most locks support 10–200+ unique codes. Issue different codes to different people — household members, cleaners, tradies — and delete individual codes without affecting others.

Time-limited codes: Most connected systems support codes that only work within a specified date/time window. Essential for Airbnb and tradie access.

Failure modes

Forgotten code: Always configure a second access method. A physical key override eliminates this as a lockout risk.

Battery flat before warning noticed: Most locks have a 9V jump-start port — keep a 9V battery at the property. Replace batteries at first low-battery warning.

Keypad surface worn: Capacitive surfaces degrade with heavy use over years. Not a short-term concern for residential use.

Battery impact

Lowest battery impact of any electronic method. The keypad activates only when touched. Offline PIN locks often achieve 12–18 month battery life.

Best for Guest access, rental properties, tradie/cleaner access, households where phone-free entry matters, anyone who prefers not to carry or rely on a device.
Method 02
Fingerprint
Fingerprint / Biometric
Touch the sensor — fastest entry, most convenient for regular users
Works Offline No Device Needed Fastest Entry

How it works

A capacitive or optical sensor reads the fingerprint ridge pattern and compares it against enrolled profiles stored locally in the lock. On a good sensor, authorised fingers unlock in under 0.5 seconds. The stored data is a mathematical template — not a photograph — and cannot be reverse-engineered to reproduce a fingerprint.

Enrol multiple fingers: Always enrol both index fingers at minimum. Enrol thumbs and other fingers as backups. If one finger has a cut, the others work. Enrol each finger in multiple positions — the sensor reads a partial print, not a whole-hand press.

Enrol key people: Enrolled profiles can be named and individually deleted. Household members can each have their own profiles — and their access can be revoked without affecting others.

Failure modes

Wet or dirty fingers: The most common failure. Wet hands from rain or washing degrade optical sensor reads significantly. Capacitive sensors handle moisture better than optical. Test your lock in wet conditions before relying on it as a primary method.

Cuts or skin changes: A deep cut across a fingerpad can prevent recognition until healed. Seasonal skin changes (very dry winters) can also affect accuracy. Always have a PIN backup active.

Young children: Small fingers and rapidly changing prints in childhood make fingerprint less reliable for under-10s. Use a PIN for children.

Battery impact

Moderate — the sensor uses power on each read. Slightly higher battery consumption than PIN-only but not significantly so for residential use.

Best for Primary residents who want hands-free entry, households where speed and convenience are the priority, situations where sharing codes is undesirable.
Method 03
Bluetooth
Bluetooth / App (Local)
Unlock via phone in range — no internet required
Works Offline ~10m Range Phone Required

How it works

Bluetooth Low Energy (BLE) communicates directly between your phone and the lock when within approximately 5–10 metres. The lock authenticates with your phone — no internet or server involved. Works during WiFi outages and power outages as long as the lock's batteries and your phone battery are charged.

Auto-unlock (hands-free): Some locks support proximity detection — the door unlocks as you approach with your phone. Convenient but introduces a consideration: if your phone is near the door without you (left on the step, in a bag by the door), the door may unlock for whoever picks it up.

Failure modes

Phone battery dead: Bluetooth fails with a dead phone. Always have a PIN or fingerprint backup configured.

Bluetooth turned off: Simple to fix — but can catch users out after a phone restart.

App update required: Occasional app updates can temporarily break Bluetooth pairing until the update is applied.

Battery impact

Low — BLE is designed for minimal power consumption. A Bluetooth-only lock without WiFi gateway can achieve 12+ month battery life on AAs.

Best for Primary residents who use their phone as the primary unlock device, hands-free entry for users who always have their phone, management of multiple user permissions via app.
Method 04
WiFi
WiFi / Remote Access
Unlock from anywhere via app — requires gateway or built-in WiFi
Requires Internet More Battery Use Audit Trail

How it works

A gateway hub (or built-in WiFi radio) connects the lock to your home network. You control the lock from anywhere via the manufacturer's app — unlock, lock, issue codes, revoke access, and receive push notifications when the door is opened or a code is used.

Gateway vs built-in WiFi: Most locks connect via a separate gateway hub (Bluetooth to the lock, WiFi to your router). Some premium models have WiFi built in and don't need a gateway. Built-in WiFi is simpler; a gateway hub allows multiple locks to share one WiFi connection.

Failure modes

Internet outage: Remote access fails. Local methods (PIN, fingerprint, Bluetooth) still work.

Server outage: The manufacturer's cloud server can go down — rare but possible. Local methods continue to work.

2.4GHz / 5GHz band merge: The most common setup problem. All smart lock gateways use 2.4GHz only. If your router merges both bands under one network name, the gateway may fail to connect. Fix: give your 2.4GHz band its own SSID. See Chapter 08.

Battery impact

Significant — WiFi radio staying active uses 30–50% more battery than offline operation. Expect 6–9 months instead of 12+ months on AAs.

Best for Airbnb and rental property management, remote properties, users who need to grant access while away from home, anyone who wants a real-time audit trail.
Method 05
RFID Card / Fob
RFID Card / Key Fob
Tap a card or fob — ideal for strata and shared access
Works Offline No Battery in Card Individually Revocable

How it works

RFID cards and fobs use the 13.56MHz MIFARE standard used in most Australian smart locks. The card contains no battery — it draws power inductively from the reader when tapped, making cards essentially maintenance-free and very long-lived.

Cards are enrolled in the lock's memory and can be individually deactivated without affecting other cards. On connected systems, this can be done remotely — immediately revoking a lost or stolen card without needing physical access to the lock.

Failure modes

Lost card: Deactivate immediately via app. No re-keying required — other cards are unaffected.

Card proximity to strong magnets: Modern RFID cards are more robust than older versions, but storing near strong magnets or RFID-blocking wallets can occasionally cause issues.

Card compatibility: Most smart locks use MIFARE Classic or MIFARE DESFire. Confirm the card format matches if you want to use existing facility cards.

Battery impact

Very low — RFID reads are brief and infrequent. Minimal battery contribution compared to WiFi or high-frequency fingerprint use.

Best for Strata buildings, small offices, staff access control, any environment where issuing and revoking individual access credentials is a regular management task.
Method 06
Facial Recognition
Facial Recognition
Completely hands-free — most advanced access method available
Works Offline Premium Price No Contact Required

2D vs 3D — this distinction matters

2D recognition uses a standard camera to compare facial geometry against stored images. It can be spoofed with a high-quality photograph in some conditions — not recommended for high-security applications.

3D recognition (Yale Luna Pro+, Vault Zenith) uses structured light projection — an infrared dot array maps the depth geometry of the face. Cannot be spoofed with a flat photograph. Works in complete darkness. The same technology as Apple Face ID.

See Chapter 06 for the full facial recognition chapter.

Failure modes

Significant facial changes: Major weight change, surgery, or significant beard growth can reduce recognition accuracy and require re-enrolment.

Privacy Act considerations: Facial geometry is sensitive information under Australian law. For commercial applications, consent and privacy policy requirements apply. See Chapter 06.

Battery impact

Higher than fingerprint or PIN due to the IR projector and camera system. Expect noticeably shorter battery life than equivalent non-facial-recognition models. Manageable with quality batteries and battery monitoring.

Best for Luxury residential, accessibility applications where hands-free entry is medically required, high-frequency users who want maximum convenience with no physical interaction.
Side-by-Side Comparison
Method
Works Offline
Phone Required
Internet Required
Battery Impact
Best For
PIN / Keypad
✓ Yes ✗ No ✗ No Low Guests, rentals, universal
Fingerprint
✓ Yes ✗ No ✗ No Low–Medium Primary residents
Bluetooth App
✓ Yes ✓ Required ✗ No Low Phone-first users
WiFi / Remote
✗ No ✓ Required ✓ Required High Airbnb, remote access
RFID Card / Fob
✓ Yes ✗ No ✗ No Very Low Strata, offices
Facial Recognition
✓ Yes ✗ No ✗ No Medium–High Premium, accessibility
Caution
Always configure at least two access methods
Every access method has a failure scenario — wet fingers, dead phone, lost card, forgotten PIN. Configure a minimum of two working methods at all times, with a physical key stored securely off-site as the final backstop. This is not overcaution — it's basic operational practice for any door lock that matters.

Not sure which method suits you?

Tell us about your household, your door, and how you actually use your front door — and we'll recommend the right primary and backup methods for your situation.