Access Credential Form Factor Tutorial

By: Brian Rhodes, Published on Mar 08, 2012

Deciding which type, or form factor, of access control credential to use and distribute can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we examine the most common form factors availible, describe the design attributes of each, and describe where they best are applied.

The common 'form factors' of credential are:

  • Card/Badges
  • Clamshells
  • Key Fobs
  • Stickers or Tokens
  • Embedded Chips

Card/Badges

This format is the popular thin, flexible plastic card that many people associate with electronic access control. Because the user can directly print images on these cards, they commonly double as Picture ID badges. The physical size of this credental varies. The most common size of this credential is described by ISO 7810 as 'CR80', but other sizes exist. This variation in sizing is considered to be a security attribute by some, because unique sizing makes the credential difficult to counterfeit.

These are inexpensive credentials, designed to be cheaply replaced. Sometimes these credentials are even considered 'disposible', like the example of hotel keycards or public transit passes. Blank card credentials can be purchased from distribution for about $0.70 per piece in bricks of 50 pieces.

Clamshells

In contrast to the 'card/badge' format, clamshells are thick, rigid pieces of plastic. This bulky form factor withstands abuse better than cards, and may be cheaper than other more durable options. Clamshell formats are older than 'card/badge' credentials, and they were designed to accomodate larger (older technology) components. These credentials can be made into picture IDs by applying a preprinted label.

The cost of this form factor depends heavily on the other design characteristics of the card. Clamshell credentials can be purchased from distribution for about $1.50 per piece in bricks of 50 pieces.

Key Fobs

Fobs are small devices intended to be located on keyrings. While these formats are not printable, they are very durable and can withstand harsh punishment. These credentials are designed to be crammed into pockets, dangle roughly from keyrings, and endure exposure to all weather environments.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

This form factor is expensive compared to other options, however they are designed to be replaced much less often. These credentials can be purchased from distribution for about $4 per piece in sleeves of 50.

Stickers or Tokens

This form factor is often applied to other items (like the heads of keys). This format is useful for making other devices 'hybrid' credentals. This format is always passively energized. This format's primary advantage is that they can quickly be externally applied to other devices. For example, applying this type of sticker to a car windshield is common method of credentialing through vehicle gates.

Pricing varies broadly for this form factor, depending on the expected service life for these credentials. This format can be customized according to a specific size or shape, or can be furnished in adhesive backed 'buttons'. This form factor can be purchased from distribution for about $2.50 per piece in quantities of 50 pieces.

Embedded chips

Embedded chips or tags are buried in muti-function devices. The chip may be actvely powered, and often this type of credential has more than one function. NFC, or 'near field communication' chips are an example of this format.

Pricing for this format is usually done in OEM component part lots and is not relevant for discussions of public purchase.

Applications

We find that certain form factors of credentials perform better than others in certain situations. We provide the following application guidelines based on our field experience:

  • Picture IDs: Cards are great for facilities that also require picture IDs. Easily worn and unobtrusive. Low cost of issue and maintenance. Printed images are sensitive to scratching or scarring, but will still function behind a clear protective sleeve.
  • Field Use: Clamshells are ideal for workers in the field or shops. Durable constuction will not bend or break easily. Can withstand moderate abuse well.
  • Demanding Environments: Key fobs are the best option for highly demanding or abusing environments. Resilient to shock or thermal abuse. Small size makes pocket storage easy.
  • Tools / Machines: Not typically used as stand alone credentials, stickers or tokens can be discretely mounted to many surfaces. Useful for appling credentials to tools, machines, or other types of credentials like metal keys.
  • Phones and Devices: Embedded chips are most used as component parts in other devices. Never used as a stand alone credential, but useful for integrating access control credentials in devices like cell phones.

2 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...
Comments : PRO Members only. Login. or Join.

Related Reports

Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact