Blog

What Hotel IT Directors Need to Know About Native Mobile Wallet Room Keys

Wallet room keys use NFC, not Bluetooth. Here's what hotel IT directors need to know about architecture, security, and deployment.

Architecture diagram showing NFC wallet key provisioning flow

What Hotel IT Directors Need to Know About Native Mobile Wallet Room Keys

If you’ve evaluated mobile keys before, you’re familiar with the BLE (Bluetooth Low Energy) model: the guest downloads the hotel’s app, the app receives a digital credential, and the phone communicates with the lock via Bluetooth to open the door.

Native mobile wallet room keys work differently. The key lives in the guest’s native mobile wallet — the same wallet used for boarding passes and payment cards — not in a hotel-specific app. The provisioning mechanism is NFC, not Bluetooth. And the key is a wallet pass, not a proprietary credential.

These architectural differences have practical implications for hotel IT.

How wallet keys are provisioned

The wallet key provisioning flow is NFC-based and occurs at the check-in interaction point — the KeyShare Puck:

  1. Guest taps their phone on the Puck.
  2. The Puck establishes an NFC session (under 500ms including the cryptographic key exchange).
  3. The Guest Experience Platform (GEP) matches the guest’s verified identity to their reservation.
  4. A wallet key is generated and transmitted to the guest’s phone through the NFC session.
  5. The key appears in the guest’s native mobile wallet.

The entire interaction takes seconds. The guest doesn’t download anything, create an account, or navigate an app — solving the adoption barrier that held back BLE-based mobile keys. The NFC session is the same kind of interaction they use when paying for coffee — familiar and fast.

What this means for your lock infrastructure

Wallet keys interact with locks differently than BLE mobile keys. With BLE, the phone communicates directly with the lock at the door. With wallet-native keys, the key is a credential stored in the wallet — the lock reads it via NFC when the guest taps their phone on the lock.

The implication: your locks must support NFC reader mode — not just BLE mobile key mode. Most modern electronic hotel locks from major vendors support this (Assa Abloy Vostio and SALTO are integrated today; dormakaba and Onity support is in progress or planned), but older BLE-only locks may need firmware updates or reader hardware additions.

The GEP platform handles lock vendor integration on the backend. It translates between the wallet key credential and each lock vendor’s platform API. The IT team doesn’t manage lock vendor protocols — that’s orchestrated by the GEP.

Security architecture

Wallet keys inherit the security properties of the native mobile wallet platform. The key is stored in the phone’s secure element or Trusted Execution Environment (TEE). It’s protected by the phone’s biometric authentication (face, fingerprint, or PIN). It cannot be extracted, copied, or shared to another device.

This is a stronger security posture than physical keycards, which can be cloned, and many BLE mobile keys, which depend on the security of the hotel’s proprietary app rather than the phone’s hardware security module.

What about guests without NFC phones?

Not every phone has NFC capability, and not every guest will be comfortable with a wallet key. The Puck supports a dual-interface fallback: NFC for wallet key provisioning, and QR code for guests who can’t or don’t want to use NFC. The QR path leads to a web-based key delivery flow — no app download required, but a slightly longer interaction than the tap.

Physical keycards remain available as a fallback for any guest who prefers them. The wallet-native approach is the default, not the only option.

PMS integration impact

From the PMS perspective, a wallet key check-in looks identical to a keycard check-in. The GEP communicates with the PMS through the adapter layer — the same reservation lookup, check-in status update, and room assignment flow. The PMS doesn’t need to know whether the key was delivered as a wallet pass, a keycard, or via a brand app.

For IT directors concerned about PMS integration complexity: if your PMS is already on the supported adapter list (Opera, Mews, Apaleo, BookingCenter, Shiji, Cloudbeds), the integration is configuration — not custom development.

Learn more about the GEP platform and PMS integration →

Share this article
Simon Forster
Written by Simon Forster

Simon Forster is the CTO of KeyShare.