Access Credential Form Factor Tutorial

Author: Brian Rhodes, Published on Mar 08, 2012

Deciding which type, or form factor, of access control credential to use and distribute can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we examine the most common form factors availible, describe the design attributes of each, and describe where they best are applied.  

The common 'form factors' of credential are:

  • ****/******
  • **********
  • *** ****
  • ******** ** ******
  • ******** *****

****/******

**** ****** ** *** ******* ****, ******** ******* **** **** many ****** ********* **** ********** ****** *******.  ******* *** **** can ******** ***** ****** ** ***** *****, **** ******** ****** as ******* ** ******. *** ******** **** ** **** ********* ******. The **** ****** **** ** **** ********** ** ********* ***** **** ** '****', *** ***** ***** *****.  **** ********* ** ****** ** considered ** ** * ******** ********* ** ****, ******* ****** sizing ***** *** ********** ********* ** ***********.

***** *** *********** ***********, ******** ** ** ******* ********. ********* these *********** *** **** ********** '**********', **** *** ******* ** hotel ******** ** ****** ******* ******. ***** **** *********** *** be ********* **** ************ *** ***** $*.** *** ***** ** ****** of ** ******.

**********

** ******** ** *** '****/*****' ******, ********** *** *****, ***** pieces ** *******. **** ***** **** ****** ********** ***** ****** than *****, *** *** ** ******* **** ***** **** ******* options. ********* ******* *** ***** **** '****/*****' ***********, *** **** were ******** ** ********** ****** (***** **********) **********. ***** *********** can ** **** **** ******* *** ** ******** * ********** label. 

*** **** ** **** **** ****** ******* ******* ** *** other ****** *************** ** *** ****. ********* *********** *** ** ********* from ************ *** ***** $*.** *** ***** ** ****** ** 50 ******.

Key ****

**** *** ***** ******* ******** ** ** ******* ** ********. While ***** ******* *** *** *********, **** *** **** ******* and *** ********* ***** **********. ***** *********** *** ******** ** be ******* **** *******, ****** ******* **** ********, *** ****** exposure ** *** ******* ************.

**** **** ****** ** ********* ******** ** ***** *******, ******* they *** ******** ** ** ******** **** **** *****. ***** credentials *** ** ********* **** ************ *** ***** $* *** piece ** ******* ** **.

Stickers ** ******

**** **** ****** ** ***** ******* ** ***** ***** (**** the ***** ** ****). **** ****** ** ****** *** ****** other ******* '******' **********. **** ****** ** ****** ********* *********. This ******'* ******* ********* ** **** **** *** ******* ** externally ******* ** ***** *******. *** *******, ******** **** **** of ******* ** * *** ********** ** ****** ****** ** credentialing ******* ******* *****.

******* ****** ******* *** **** **** ******, ********* ** *** expected ******* **** *** ***** ***********. **** ****** *** ** customized ********* ** * ******** **** ** *****, ** *** be ********* ** ******** ****** '*******'. **** **** ****** *** be ********* **** ************ *** ***** $*.** *** ***** ** ********** of ** ******.

Embedded *****

******** ***** ** **** *** ****** ** ****-******** *******. *** chip *** ** ******* *******, *** ***** **** **** ** credential *** **** **** *** ********.***, ** '**** ***** *************' ***** *** ** ******* ** **** ******.

******* *** **** ****** ** ******* **** ** *** ********* part **** *** ** *** ******** *** *********** ** ****** purchase. 

************

** **** **** ******* **** ******* ** *********** ******* ****** than ****** ** ******* **********. ** ******* *** ********* *********** guidelines ***** ** *** ***** **********:

  • ******* ***: ***** *** ***** *** ********** **** **** ******* ******* IDs. ****** **** *** ***********. *** **** ** ***** *** maintenance. ******* ****** *** ********* ** ********** ** ********, *** will ***** ******** ****** * ***** ********** ******.
  • ***** ***: ********** *** ***** *** ******* ** *** ***** ** shops. ******* *********** **** *** **** ** ***** ******.  *** withstand ******** ***** ****. 
  • ********* ************: *** **** *** *** **** ****** *** ****** ********* or ******* ************. ********* ** ***** ** ******* *****. ***** size ***** ****** ******* ****.
  • ***** / ********: *** ********* **** ** ***** ***** ***********, ******** ** tokens *** ** ********** ******* ** **** ********. ****** *** appling *********** ** *****, ********, ** ***** ***** ** *********** like ***** ****.
  • ****** *** *******: ******** ***** *** **** **** ** ********* ***** ** other *******. ***** **** ** * ***** ***** **********, *** useful *** *********** ****** ******* *********** ** ******* **** **** phones.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Competing Against G4S on Aug 09, 2017
G4S Secure Solutions is a global company, operating in multiple countries and offering a suite of products and services from guards to their AMAG...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released Profile C for access control, but in the 3 years since, only 2 companies...
Access Control Commissioning / Install Checklist on Aug 03, 2017
This 80+ point checklist helps end users, integrators and consultants verify that access control installation is complete. It covers the following...
Super Low Light Surveillance Guide on Aug 01, 2017
At the beginning of this decade, low light performance of megapixel cameras was generally terrible. This was the era of super slow shutter where...
Bosch G-Series Intrusion Tested on Jul 26, 2017
Bosch is one of the biggest names in intrusion, and the company's G-Series panels are their most advanced commercial and high-security panels. But...
Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Smartcard Copier Tested (13.56MHz) on Jul 05, 2017
Copying 125kHz cards is certainly easy, as our test results showed, but how about 13.56MHz smart cards? Are they more secure? IPVM focused on the...
H.265 / HEVC Codec Tutorial 2017 on Jun 30, 2017
For years, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...

Most Recent Industry Reports

Save $50 - IP Networking Course September 2017 on Aug 16, 2017
Tomorrow, Thursday, August 17th is the last day to save $50 on the September IP Networking Course. This is the only networking course designed...
Hikvision Responds To Cracked Security Codes on Aug 15, 2017
Hikvision has responded to IPVM's report on Hikvision's security code being cracked, both with a 2 page update to dealers and communication...
Stolen Video NVR / DVR Statistics on Aug 15, 2017
"But what happens if someone steals my recorder?" Anyone who has done more than a handful of jobs has probably heard this question several times....
Hikvision Europe Cutting Out Unauthorized End User Sales on Aug 15, 2017
The days of anyone buying Hikvision from anywhere off the Internet are numbered, at least in Europe, if Hikvision's plan comes to fruition. In...
Axis Laser Focus PTZ Tested on Aug 14, 2017
Axis has been touting its new Q6155-E laser focus PTZ as 'always in focus' and 'always in color'. Does it really deliver? We bought and tested...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
Cellphone Usage Issues For Integrators (Statistics) on Aug 11, 2017
Cellphones clearly offer significant advantages in communication and problem solving. But they can also be a major pain point if employees...
Rebooting IP Camera Statistics And Practices on Aug 10, 2017
Dahua cameras automatically reboot weekly, by default. Is this an innovation by the Chinese mega-manufacturer or a sign of a problems? 125...
Avigilon Profits Surge, Stock Jumps (Q2 2017) on Aug 10, 2017
Avigilon said earlier this year they would shift their strategy to maximizing profits. Now, they are delivering it and the stock market is...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact