Access Credential Form Factor Tutorial

Author: Brian Rhodes, Published on Mar 08, 2012

Deciding which type, or form factor, of access control credential to use and distribute can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we examine the most common form factors availible, describe the design attributes of each, and describe where they best are applied.  

The common 'form factors' of credential are:

  • ****/******
  • **********
  • *** ****
  • ******** ** ******
  • ******** *****

****/******

**** ****** ** *** ******* ****, ******** ******* **** **** many ****** ********* **** ********** ****** *******.  ******* *** **** can ******** ***** ****** ** ***** *****, **** ******** ****** as ******* ** ******. *** ******** **** ** **** ********* ******. The **** ****** **** ** **** ********** ** ********* ***** **** ** '****', *** ***** ***** *****.  **** ********* ** ****** ** considered ** ** * ******** ********* ** ****, ******* ****** sizing ***** *** ********** ********* ** ***********.

***** *** *********** ***********, ******** ** ** ******* ********. ********* these *********** *** **** ********** '**********', **** *** ******* ** hotel ******** ** ****** ******* ******. ***** **** *********** *** be ********* **** ************ *** ***** $*.** *** ***** ** ****** of ** ******.

**********

** ******** ** *** '****/*****' ******, ********** *** *****, ***** pieces ** *******. **** ***** **** ****** ********** ***** ****** than *****, *** *** ** ******* **** ***** **** ******* options. ********* ******* *** ***** **** '****/*****' ***********, *** **** were ******** ** ********** ****** (***** **********) **********. ***** *********** can ** **** **** ******* *** ** ******** * ********** label. 

*** **** ** **** **** ****** ******* ******* ** *** other ****** *************** ** *** ****. ********* *********** *** ** ********* from ************ *** ***** $*.** *** ***** ** ****** ** 50 ******.

Key ****

**** *** ***** ******* ******** ** ** ******* ** ********. While ***** ******* *** *** *********, **** *** **** ******* and *** ********* ***** **********. ***** *********** *** ******** ** be ******* **** *******, ****** ******* **** ********, *** ****** exposure ** *** ******* ************.

**** **** ****** ** ********* ******** ** ***** *******, ******* they *** ******** ** ** ******** **** **** *****. ***** credentials *** ** ********* **** ************ *** ***** $* *** piece ** ******* ** **.

Stickers ** ******

**** **** ****** ** ***** ******* ** ***** ***** (**** the ***** ** ****). **** ****** ** ****** *** ****** other ******* '******' **********. **** ****** ** ****** ********* *********. This ******'* ******* ********* ** **** **** *** ******* ** externally ******* ** ***** *******. *** *******, ******** **** **** of ******* ** * *** ********** ** ****** ****** ** credentialing ******* ******* *****.

******* ****** ******* *** **** **** ******, ********* ** *** expected ******* **** *** ***** ***********. **** ****** *** ** customized ********* ** * ******** **** ** *****, ** *** be ********* ** ******** ****** '*******'. **** **** ****** *** be ********* **** ************ *** ***** $*.** *** ***** ** ********** of ** ******.

Embedded *****

******** ***** ** **** *** ****** ** ****-******** *******. *** chip *** ** ******* *******, *** ***** **** **** ** credential *** **** **** *** ********.***, ** '**** ***** *************' ***** *** ** ******* ** **** ******.

******* *** **** ****** ** ******* **** ** *** ********* part **** *** ** *** ******** *** *********** ** ****** purchase. 

************

** **** **** ******* **** ******* ** *********** ******* ****** than ****** ** ******* **********. ** ******* *** ********* *********** guidelines ***** ** *** ***** **********:

  • ******* ***: ***** *** ***** *** ********** **** **** ******* ******* IDs. ****** **** *** ***********. *** **** ** ***** *** maintenance. ******* ****** *** ********* ** ********** ** ********, *** will ***** ******** ****** * ***** ********** ******.
  • ***** ***: ********** *** ***** *** ******* ** *** ***** ** shops. ******* *********** **** *** **** ** ***** ******.  *** withstand ******** ***** ****. 
  • ********* ************: *** **** *** *** **** ****** *** ****** ********* or ******* ************. ********* ** ***** ** ******* *****. ***** size ***** ****** ******* ****.
  • ***** / ********: *** ********* **** ** ***** ***** ***********, ******** ** tokens *** ** ********** ******* ** **** ********. ****** *** appling *********** ** *****, ********, ** ***** ***** ** *********** like ***** ****.
  • ****** *** *******: ******** ***** *** **** **** ** ********* ***** ** other *******. ***** **** ** * ***** ***** **********, *** useful *** *********** ****** ******* *********** ** ******* **** **** phones.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Milestone / Lenel Resell Partnership on Apr 03, 2017
Lenel has never found success in video management. Nearly a decade ago Lenel OEMed an OEM of Milestone. Now, in an equally uncommon move,...

Most Recent Industry Reports

H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...
Hikvision Marketer Caught Spamming, Fails at Coverup, Fired on May 23, 2017
A Hikvision marketing employee was caught by IPCamTalk trying to surreptitiously disparage IPVM and IPCamTalk. This is an outgrowth of Hikvision's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact