Blog About Authors

Hotel Key Card Systems

5 min read By Benjamin Cloughessy
cover for Hotel Key Card Systems

Hotel Key Card Systems

Disclaimer

I am a software developer, not a cybersecurity professional, and this is my own personal exploration into a specific hotel’s security system - without insider knowledge. My understanding could be incorrect.

Additionally, exploiting systems in this manner is both illegal and harmful to real people. This is morally deplorable and I do not advise it.

Introduction

Why This Matters

I recently stayed at a hotel with my family where they gave us all bracelets with RFID chips. These bracelets could open our door and even charge purchases to our room at various hotel restaurants! However, the bracelets were (supposedly) useless until our room was ready, at which point I received a text message with our room number and our bracelets became functional.

I also noticed that the same bracelets were used by employees to access employee-only areas. Being inherently curious, I set out to understand - more or less - how the system worked (and how it didn’t work).

System Overview

Modern hotel key card systems integrate access control, payment systems, and guest management into a single platform. These systems must balance security, convenience, and operational efficiency - often leading to interesting compromises in implementation.

System Components

Physical Components

  • Room Assignment: Your room number serves as a unique identifier in the system, linked to your personal details (email, phone, billing) in the Property Management System (PMS)
  • Key Card/Bracelet (RFID)
  • Key Encoder: The hardware device that writes encrypted access credentials to RFID cards/bracelets
  • Key Card Readers: The endpoints of the system, mounted on doors and payment terminals

Software Systems

  • Property Management System (PMS): The central database and management software that handles reservations, guest information, billing, and access control
  • Front Desk Computer: The terminal that interfaces with both the PMS and key encoder
  • Door Lock Software: Embedded systems that validate credentials and control access

Human Elements

  • Front Desk Worker: Tired and stressed people who will give you anything to please just go away
  • Guests: Also tired and stressed people, but for different reasons
  • Hotel Staff: ALl the little worker bees with elevated access privileges for maintenance and operations

Technical Implementation

Access Control Flow

Here’s a high-level diagram of the general key card life cycle and use cases, as I saw them.

Access Control FLow

Key Card Creation Process

And here’s a more detailed breakdown of how I imagine the key card creation + usage going down.

Key Card Creation Process

Security Vulnerabilities

Physical Vulnerabilities

  • RFID chips can be read and potentially cloned
    • Depending on the frequency of the chip and whether or not it uses some sort of authentication protocol, that could vary in degree of ease, but it can be done.
  • Key cards can be lost or stolen
  • If our bad actor has some spy skills, encoding equipment could be physically accessed

Technical Vulnerabilities

The network communications between systems present another potential vulnerability. When a key card is encoded, sensitive data must flow between the PMS, the front desk computer, and the key encoder. If this traffic isn’t properly encrypted, a bad actor could potentially:

  • Intercept the encoding instructions
  • Capture the encryption keys or algorithms being used
  • Monitor patterns in the data to identify weaknesses

Human Factor Vulnerabilities

  • Front desk staff may issue replacement cards without proper verification
    • I actually tested this one. No less than three times (from three different employees) I receieved a new key card for my room with no verification required outside of the room number.
  • Guests may share access credentials
  • Staff may not follow security protocols consistently

Potential Exploitations

Unauthorized Access

  • Request someone else’s room key at the front desk
  • Clone RFID data from exposed cards/bracelets
  • Exploit weak encryption in the key writing process
    • By taking an rfid chip (or several) to a secure location, a bad actor could analyze the encrypted values in an attempt to crack the hotel’s encryption algorithm. This one is probably a long shot, but the hotel might be using some low-entropy process or have a weak encryption key. Once the encryption algorithm is cracked, new key cards with varying access levels could be written.

Financial Fraud

  • Charge purchases to other guests’ rooms
  • Access billing information through system vulnerabilities
    • The PMS system contains guests’ payment information, and may have it’s own vulnerabilities.

Data Theft

  • Extract guest data from compromised key cards (if the encryption algorithm has been cracked)
  • Intercept network traffic during key operations

Risk Mitigation

Hotel Remediations

MFA System Implementation

Benefits:

  • Reduced risk of unauthorized access
  • Better audit trail of key card requests
  • Enhanced guest confidence in security

Costs:

  • Increased complexity for front desk staff
  • Potential guest friction during key replacement
  • Training requirements for staff

Mobile Key System

Benefits:

  • Elimination of physical key card vulnerabilities
  • Modern guest experience

Costs:

  • Significant initial infrastructure investment
  • Guest adoption challenges (we all know who I’m talking about)
  • Need for backup systems for phones without power
  • Tech support nightmare (see ‘guest adoption challenges’)

Personal Safeguards

Physical Security

  • Never leave your key card/bracelet unattended in public areas
  • Use the manual deadbolt or security latch when in your room
  • Store valuables in the room safe

Financial Protection

  • Consider declining to link your key card to payment privileges
  • If you do link payment, set up alerts for room charges

Access Control

  • Report lost cards immediately to the front desk
  • Request new cards if you suspect yours has been compromised
  • Don’t share your room number or key card with others

Conclusion

For any hotels that can swing it, it’s best to just rip off the bandaid and move to mobile. For those that really can’t, maybe an MFA solution is a good compromise until mobile key cards become more accessible.

Related Posts

There are no related posts yet. 😢
Benjamin Cloughessy avatar

About the Author

Benjamin Cloughessy

Adventurer

Benjamin is a software developer and student of the Word, passionate about both knowing and believing the bible. He particularly is passionate about bringing biblical literacy to the charismatic part of Christ's body.