Access Credential Form Factor Tutorial

Author: Brian Rhodes, Published on Mar 08, 2012

Deciding which type, or form factor, of access control credential to use and distribute can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we examine the most common form factors availible, describe the design attributes of each, and describe where they best are applied.

The common 'form factors' of credential are:

  • Card/Badges
  • Clamshells
  • Key Fobs
  • Stickers or Tokens
  • Embedded Chips

Card/Badges

This format is the popular thin, flexible plastic card that many people associate with electronic access control. Because the user can directly print images on these cards, they commonly double as Picture ID badges. The physical size of this credental varies. The most common size of this credential is described by ISO 7810 as 'CR80', but other sizes exist. This variation in sizing is considered to be a security attribute by some, because unique sizing makes the credential difficult to counterfeit.

These are inexpensive credentials, designed to be cheaply replaced. Sometimes these credentials are even considered 'disposible', like the example of hotel keycards or public transit passes. Blank card credentials can be purchased from distribution for about $0.70 per piece in bricks of 50 pieces.

Clamshells

In contrast to the 'card/badge' format, clamshells are thick, rigid pieces of plastic. This bulky form factor withstands abuse better than cards, and may be cheaper than other more durable options. Clamshell formats are older than 'card/badge' credentials, and they were designed to accomodate larger (older technology) components. These credentials can be made into picture IDs by applying a preprinted label.

The cost of this form factor depends heavily on the other design characteristics of the card. Clamshell credentials can be purchased from distribution for about $1.50 per piece in bricks of 50 pieces.

Key Fobs

Fobs are small devices intended to be located on keyrings. While these formats are not printable, they are very durable and can withstand harsh punishment. These credentials are designed to be crammed into pockets, dangle roughly from keyrings, and endure exposure to all weather environments.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

This form factor is expensive compared to other options, however they are designed to be replaced much less often. These credentials can be purchased from distribution for about $4 per piece in sleeves of 50.

Stickers or Tokens

This form factor is often applied to other items (like the heads of keys). This format is useful for making other devices 'hybrid' credentals. This format is always passively energized. This format's primary advantage is that they can quickly be externally applied to other devices. For example, applying this type of sticker to a car windshield is common method of credentialing through vehicle gates.

Pricing varies broadly for this form factor, depending on the expected service life for these credentials. This format can be customized according to a specific size or shape, or can be furnished in adhesive backed 'buttons'. This form factor can be purchased from distribution for about $2.50 per piece in quantities of 50 pieces.

Embedded chips

Embedded chips or tags are buried in muti-function devices. The chip may be actvely powered, and often this type of credential has more than one function. NFC, or 'near field communication' chips are an example of this format.

Pricing for this format is usually done in OEM component part lots and is not relevant for discussions of public purchase.

Applications

We find that certain form factors of credentials perform better than others in certain situations. We provide the following application guidelines based on our field experience:

  • Picture IDs: Cards are great for facilities that also require picture IDs. Easily worn and unobtrusive. Low cost of issue and maintenance. Printed images are sensitive to scratching or scarring, but will still function behind a clear protective sleeve.
  • Field Use: Clamshells are ideal for workers in the field or shops. Durable constuction will not bend or break easily. Can withstand moderate abuse well.
  • Demanding Environments: Key fobs are the best option for highly demanding or abusing environments. Resilient to shock or thermal abuse. Small size makes pocket storage easy.
  • Tools / Machines: Not typically used as stand alone credentials, stickers or tokens can be discretely mounted to many surfaces. Useful for appling credentials to tools, machines, or other types of credentials like metal keys.
  • Phones and Devices: Embedded chips are most used as component parts in other devices. Never used as a stand alone credential, but useful for integrating access control credentials in devices like cell phones.

2 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...
Comments : PRO Members only. Login. or Join.

Related Reports

ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
Register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Alarm.com Favorability Results 2019 on Apr 15, 2019
The once dot com startup has evolved to become a core provider for home security and is now expanding into commercial. In their first entry in...
ISC West 2019 Report on Apr 12, 2019
The IPVM team has finished at the Sands looking at what companies are offering and how they are changing their positioning. See below for 50+...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
Spring 2019 50+ New Products Directory on Apr 08, 2019
We are compiling a list of new products for Spring 2019 and have over 50 already. Contrast to Fall 2018 New Products Directory and Spring 2018...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe.  They have already released their Gatekeeper Halberd...
Airship VMS Profile on Apr 03, 2019
Airship has been developing VMS software for over 10 years, however, with no outside investment, and minimal marketing, the company is not well...
Silicon Valley Access Startup Proxy Raises $13.6 Million on Mar 28, 2019
This mobile-credential based access startup just raised $13.6 million in funding.  Further, they claim that their technology can free businesses...

Most Recent Industry Reports

H.265 Usage Statistics on Apr 19, 2019
H.265 has been available in IP cameras for more than 5 years and, in the past few years, the number of manufacturers supporting this codec has...
ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
Register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer...
Riser vs Plenum Cabling Explained on Apr 18, 2019
You could be spending twice as much for cable as you need. The difference between 'plenum' rated cable and 'riser' rated cable is subtle, but the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
Milestone Drops IFSEC on Apr 18, 2019
Milestone has dropped out of Europe's largest annual security trade show (IFSEC 2019), telling IPVM that they "have found that IFSEC in EMEA no...
The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Securadyne CEO: IPVM 'Entertaining For An Ignorant Few' on Apr 16, 2019
Securadyne's CEO Carey Boethel is unhappy with IPVM's report - Failed Integrator Rollup, Securadyne Sells to Guard Giant Allied. Indeed, he...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact