Access Credential Form Factor Tutorial

Author: Brian Rhodes, Published on Mar 08, 2012

Deciding which type, or form factor, of access control credential to use and distribute can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we examine the most common form factors availible, describe the design attributes of each, and describe where they best are applied.

The common 'form factors' of credential are:

  • Card/Badges
  • Clamshells
  • Key Fobs
  • Stickers or Tokens
  • Embedded Chips

Card/Badges

This format is the popular thin, flexible plastic card that many people associate with electronic access control. Because the user can directly print images on these cards, they commonly double as Picture ID badges. The physical size of this credental varies. The most common size of this credential is described by ISO 7810 as 'CR80', but other sizes exist. This variation in sizing is considered to be a security attribute by some, because unique sizing makes the credential difficult to counterfeit.

These are inexpensive credentials, designed to be cheaply replaced. Sometimes these credentials are even considered 'disposible', like the example of hotel keycards or public transit passes. Blank card credentials can be purchased from distribution for about $0.70 per piece in bricks of 50 pieces.

Clamshells

In contrast to the 'card/badge' format, clamshells are thick, rigid pieces of plastic. This bulky form factor withstands abuse better than cards, and may be cheaper than other more durable options. Clamshell formats are older than 'card/badge' credentials, and they were designed to accomodate larger (older technology) components. These credentials can be made into picture IDs by applying a preprinted label.

The cost of this form factor depends heavily on the other design characteristics of the card. Clamshell credentials can be purchased from distribution for about $1.50 per piece in bricks of 50 pieces.

Key Fobs

Fobs are small devices intended to be located on keyrings. While these formats are not printable, they are very durable and can withstand harsh punishment. These credentials are designed to be crammed into pockets, dangle roughly from keyrings, and endure exposure to all weather environments.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

This form factor is expensive compared to other options, however they are designed to be replaced much less often. These credentials can be purchased from distribution for about $4 per piece in sleeves of 50.

Stickers or Tokens

This form factor is often applied to other items (like the heads of keys). This format is useful for making other devices 'hybrid' credentals. This format is always passively energized. This format's primary advantage is that they can quickly be externally applied to other devices. For example, applying this type of sticker to a car windshield is common method of credentialing through vehicle gates.

Pricing varies broadly for this form factor, depending on the expected service life for these credentials. This format can be customized according to a specific size or shape, or can be furnished in adhesive backed 'buttons'. This form factor can be purchased from distribution for about $2.50 per piece in quantities of 50 pieces.

Embedded chips

Embedded chips or tags are buried in muti-function devices. The chip may be actvely powered, and often this type of credential has more than one function. NFC, or 'near field communication' chips are an example of this format.

Pricing for this format is usually done in OEM component part lots and is not relevant for discussions of public purchase.

Applications

We find that certain form factors of credentials perform better than others in certain situations. We provide the following application guidelines based on our field experience:

  • Picture IDs: Cards are great for facilities that also require picture IDs. Easily worn and unobtrusive. Low cost of issue and maintenance. Printed images are sensitive to scratching or scarring, but will still function behind a clear protective sleeve.
  • Field Use: Clamshells are ideal for workers in the field or shops. Durable constuction will not bend or break easily. Can withstand moderate abuse well.
  • Demanding Environments: Key fobs are the best option for highly demanding or abusing environments. Resilient to shock or thermal abuse. Small size makes pocket storage easy.
  • Tools / Machines: Not typically used as stand alone credentials, stickers or tokens can be discretely mounted to many surfaces. Useful for appling credentials to tools, machines, or other types of credentials like metal keys.
  • Phones and Devices: Embedded chips are most used as component parts in other devices. Never used as a stand alone credential, but useful for integrating access control credentials in devices like cell phones.

2 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...
Comments : PRO Members only. Login. or Join.

Related Reports

Private School IT Manager Surveillance Interview on Feb 22, 2019
This IT manager describes himself as the "oft-maligned IT person" whose "opinions may not always be appreciated by the integrator crowd." But he is...
HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
ONVIF Video Surveillance Tutorial on Jan 29, 2019
ONVIF is well known within the surveillance industry as an interface to connect IP cameras and VMS systems. However, new users may find it...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Genetec Favorability Report 2019 on Jan 25, 2019
Genetec's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing solid, but...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...

Most Recent Industry Reports

From The Basement To Buried Behind Chinatown: ISC West Emerging Technology Zone on Feb 22, 2019
What does ISC West think about 'Emerging Technology'? Well, last year, they put those companies in the basement. This year, they moved them up to...
Private School IT Manager Surveillance Interview on Feb 22, 2019
This IT manager describes himself as the "oft-maligned IT person" whose "opinions may not always be appreciated by the integrator crowd." But he is...
Outdoor Camera Mounting Hardware Guide on Feb 21, 2019
Mounting cameras outdoors can be challenging, requiring understanding different types of equipment and methods. In this guide, we teach this...
HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...
First US State, Vermont, Bans Dahua and Hikvision on Feb 21, 2019
The first US state, Vermont, has issued a ban on a number of Chinese and Russian manufacturers including the world's 2 largest video surveillance...
ADI 'SAVE BIG' On FLIR And Hikvision Examined on Feb 20, 2019
One is a major US defense supplier. The other is owned by the Chinese government. But you can "SAVE BIG" on both at ADI. In this note, we...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Massive Leak Of Chinese VMS Provider Exposes Xinjiang Surveillance on Feb 20, 2019
A subsidiary of China’s claimed largest VMS provider is tracking the precise location and ethnicity of millions in China’s Xinjiang region,...
Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Sales Cuts At Rasilient on Feb 19, 2019
Over the past 2 years, video surveillance storage specialist Rasilient has expanded its workforce significantly, aiming to build its own branded...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact