Case Study

PAC-BLU

Security / Bluetooth Access Control

Hybrid cloud/BLE commercial door access system for Pacific Lock Company

Client

PAC-BLU

Model

Tech Partnership

Industry

Industrial IoT

Timeline

3 Months

  • Latest way to control your Access series systems in a convenient
  • easily install, configure, remove, and unlock your Access devices
PAC_logo

Key Outcomes

Delivered a hybrid cloud/BLE access control system where credentials are managed in the cloud but door unlocks happen via local Bluetooth — ensuring access works even without internet at the door

Supported PAC-BLU Access and Access Mini controllers with up to 3-amp relay control, audit trail logging, and door scheduling for commercial facilities

Turned smartphones into secure access credentials, eliminating the need for physical key cards while maintaining enterprise-grade security and audit compliance

The Challenge

Before partnering with Iottive, Pacific Lock Company was facing several issues:

Internet Dependency for Access Control

Cloud-only access control systems fail when network connectivity is disrupted — precisely when physical security matters most. Pacific Lock needed a system that maintained full functionality at the door regardless of internet availability.

Physical Credential Management Overhead

Traditional key cards and fobs require inventory management, physical distribution, and deactivation when employees leave. For multi-site commercial facilities, this created significant administrative burden and security gaps.

PAC_image

Limited Audit Trail Capabilities

Existing mechanical and basic electronic locks provided no visibility into who accessed which door and when. Facility managers had no way to investigate security incidents or demonstrate compliance with access policies.

Scalable Hardware Support

Pacific Lock’s product line included multiple controller models (PAC-BLU Access and Access Mini) with different relay specifications. The companion app needed to support all variants with a single, consistent interface.

Our Solution

Iottive delivered a comprehensive Bluetooth access control application under a full-cycle product development model.

stable-bluetooth-connectivity

Bluetooth & IoT Expertise

Engineered a hybrid cloud/BLE architecture: the admin grants access credentials via a cloud portal, the user’s phone downloads and stores those credentials locally, and when the user approaches a PAC-BLU controller, the phone unlocks the door via direct Bluetooth communication — no internet required at the point of entry.

creative-thinking (1) 3

Design Thinking Approach

Mapped the complete access workflow — from admin credential assignment to the moment a user walks up to a door. The UX was optimized for the “approach and unlock” interaction: minimal taps, fast BLE connection, and clear visual/haptic confirmation.

project-planning

Project Planning & Execution

Delivered in three phases: BLE door unlock and credential storage (Phase 1), cloud credential management and admin portal (Phase 2), audit trail, scheduling, and multi-controller support (Phase 3).

package-delivered 1

Functionalities Delivered

BLE door unlock with encrypted credential exchange, cloud-based credential provisioning, support for PAC-BLU Access and Access Mini controllers, audit trail with timestamped access logs, door scheduling (time-based access windows), admin management for user permissions, and relay control up to 3 amps.

Implementation Highlights

Design app

Hybrid Cloud/BLE Architecture

Designed a split-plane architecture: the cloud manages credentials, permissions, and audit data, while BLE handles the real-time door unlock. Credentials are cryptographically signed in the cloud and verified locally by the controller — no round-trip needed.

BLE & Wi-Fi Deployment

BLE Access Protocol

Built a secure BLE communication protocol between the phone and PAC-BLU controllers. The protocol handles device discovery, mutual authentication, credential presentation, and relay activation within a sub-second interaction window.

Smart Load Management

Credential Lifecycle Management

Implemented full credential lifecycle: issuance from admin portal, secure download to phone, local storage in encrypted keychain, periodic refresh, and remote revocation. Revoked credentials are invalidated on next cloud sync.

Compliance

Audit Trail & Compliance

Every access event — successful unlock, denied attempt, credential refresh — is logged with timestamp, user identity, door identity, and BLE signal metadata. Logs sync to the cloud for facility manager review and compliance reporting.

Optimized Scheduling

Door Scheduling Engine

Built a scheduling system allowing admins to define time-based access windows (e.g., “Building A: Mon– Fri 7AM–7PM, Sat 8AM–1PM”). Schedules are enforced locally on the controller, ensuring policy compliance even when offline.

multi role

Multi-Controller Support

Abstracted the BLE communication layer to support both PAC-BLU Access (full-size, up to 3A relay) and Access Mini (compact) controllers through a unified app interface, with hardware specific configuration handled transparently.

Results & Impact

  • Zero-internet door unlock via local BLE — access control remains fully functional during network outages
  • Physical key card inventory eliminated for facilities using smartphone-based credentials
  • Complete audit trail for every access event, supporting security investigations and compliance requirements
  • Sub-second unlock experience from approach to door release, matching the speed of traditional proximity cards
  • Single app supports multiple PAC-BLU controller models, simplifying deployment for facility managers

“The hybrid approach was non-negotiable for us — our customers cannot accept a door that stops working because the WiFi is down. Iottive engineered exactly that: cloud convenience with local reliability. The BLE unlock is faster than a key card.”

— Gregory B. Waugh, PAC-BLU

Lessons & PAC-BLU

Design for the Disconnected State First

The most critical moment in access control — the door unlock — must work without any network dependency. Designing the offline-first BLE unlock protocol before building cloud features ensured the core promise was never compromised.

Security Is the Product, Not a Feature

In access control, every BLE packet is a potential attack vector. Cryptographic credential signing, mutual authentication, and encrypted communication were foundational architecture decisions, not post development additions.

Optimize for Interaction Speed

Users expect a door to open instantly. BLE connection time, credential verification, and relay activation were each optimized individually, with a combined target of under one second from approach to unlock.

Abstract Hardware Early

Supporting multiple controller variants (Access and Access Mini) from a single app required hardware abstraction from the first sprint. Waiting to add multi-device support later would have required significant refactoring.

Technology

Comprehensive IoT Technology Stack

From devices and connectivity to cloud, apps, and security — we leverage a full-stack IoT ecosystem to build scalable, secure, and future-ready solutions.

kotlin

Android (Kotlin)

bluetooth-logo-1

BLE

aws

AWS

PAC_partner

Why Iottive’s the Right Partner

  • Deep BLE protocol engineering experience — including the sub-second timing and security requirements unique to physical access control
  • Proven hybrid cloud/local architecture design that delivers cloud convenience without compromising offline reliability
  • Experience integrating mobile apps with commercial hardware controllers, handling the full stack from relay activation to cloud audit trails

Next Steps for Pacific Lock Company

Expand to iOS to support iPhone-based credentials across the full Apple ecosystem, including Apple Wallet integration

Add UWB (Ultra-Wideband) support for hands-free proximity unlock without requiring the user
to open the app

Develop a web-based facility management dashboard with floor plans, real-time door status, and access analytics

Implement visitor management with temporary, time-limited BLE credentials that auto-expire after scheduled visits