Access Control: Combo Reader / Controllers Tutorial

Author: Brian Rhodes, Published on Jul 22, 2013

Economical or foolhardy? Industry professionals are torn on combination door readers. These units typically integrate credential readers and door controllers into a single unit hung outside the door. Does the tampering risk also mean they are a security risk? We look at the units in this note, weigh the pros and cons, and address whether and where the risk is worth the benefit.

The Risk

********** *** ********** ** *** ******* ** *** ****** **** means ** *** ** ******** ****, **********, ** ******** *******. When *** ****** *** ********** *** ******** *******, **** **** is *********. *** ********* **** ** ******** ** *** ****** or ****** ****, *** ** *** ********** ********* ** ********* ****** such ******, ** ****** ******* ********** ** ***** *** ****.

*******, **** *** ****** *** *** ********** *** *** **** device, ** ****** ********** *** *************. ** ******* **** * combo **** *** *** ****, **** *** ******** ****** ******, or **** ** ****** *** *** ******** ******* **** * wide **** ****? ***** **** ********* ******* *** ********* **** as *** ***** ** *** ***** *****, * ****** **** ******* the **** ** *** *** **** *** *** ***** *** without **********.

****** ****

**** ****** ********** ***** ******* * '**********', ***** *********** **** ********, *** * '******', ***** ** *** ******* ********** *********. *************, ***** ********** have **** ********, ******** ***** **** **** **** ** ** ********* and *********.

*******, ******* ****** ************* ***** '***********' ***** **** ***** *********** and ******* **** * ****** ****. ***** ******** ***** '*************' compatible ******** ******* *** *** **********, *** *** * ****** box ** ******* **** ** ********** ****** ** ***.

*** ** *** ****** ***** ******** ** * ***** **** is ****** **** *** ***********, ******** *** **** ******** ** ***** ** **** '********* readers' **** ******* '***** *****' *********. ******, *** ****** **** includes * ****** ** ****** ******** *** *********** **** ******** is ********** ** *** **** ****: **** ********** *********.

 

Hardware *******

*** **** ** ******* ******** **** ********** *** **** ** risk ********* ********. *** ***** **** ******* ********* *****, **** maglocks, ******** *** ********** *** ********* ***** ** *** ***** and ***** **** ** ** *********. *******, ******** ******* *** generally *** ********** ** ********** *******, *** ******* ***** *********.

********:**** **** ******** *** ************* ******* *** *** '******** *******' from *** **********, *** ********** **** ** * ***** ** the ***** *******, *** ******** *** ********** ****** *** *******. The ***** ***** ************* ******* **** ********:

******** *******:******* ** *** **** ** ****** *** **** *****, **** simply ***** **** ******** ** ****** ****** ***** ********** *** door ** ****. ** **** *****, *** ****** ** ********* until *** ****** ****** ******* * **** ** ****. ****, the ********** ****** ***** ** *** ******, ******** *** **** lock ** ***** ****** ******* *** ******.

***** ******, **** ******* *** **** ** ******** *** ********** free *************; ** *** ********** ** ****, *** ****** ******* unpowered *** *** **** ***** *****. ** ****, ** ***** require ** ********** ** ***** ****** *** ********* ** ***** wires ***** *** ****** ** ***** ** '******' *** ****. While ***** * *************, **** ***** ** ********* ******** **** familiarity **** **** ** *** *******.

Tamper *************

********* ** ***** *********** ********* ******* * '****** ******' **** detects ******* ******* ** *** ********** **** *** ****, *** locks *** *** **** **** ******* ********** ***** ** *******. This ****** ****** *** **** ******* ***** ******** **** ***** authorities/operators **** *** ********** ** ***** ********:

***** *** ********* ***** ** ****** ******, **** *** *** mechanical **** ***** *****, ****** *** ** '******* ******' **** uses ** ** ******* ** ****** ********. ** *** ****, using **** ***** ****** * ******** **** ** ********** *** ********** and ****, **** ****.

****

*** ******* ************* ** ***** ***** ***** ***** **** ****** cost **** *********** *******. *** *******:

********: ** *** **** ***** ~$***, *** ****** * *** ****** at ~$** ***** ****** $***.  *******, ****** *** ******** ***** cost ** ******* *** ****** *** *** ~$** - ~$*** to *** ****, *** * ***** ******* ** *** $****.

*****: * ****** **** *** ***** ***** ~$***. *********** *** installation **** ** ******* ********* ******* ** $** - $*** savings *** ****.

External **********

** ******** ***** *** *************** ** * ***** **** *** high, ********** *** **** ****** ************ ******* ***************** ******* *** ****. ************* ************* ******** **** **** ********* ******* *** **** ***** ** environmental ********** ******* ******** *** **** - ****** ******* ** optical *******.

***** ********** *** ** ***** ** *******, *** * ********* designed **** ********* ****** ***** ** ****** *******, *** ********* mount **** * ****** ******* **** **** ********** **** ***** fasteners.

*******, ****** ********** *** *********, ********** **** ***** *** ***** cost ** ****** ***. ********** **** ******* ~$** - $*** each, ********* ********** *** ******* ** ***** * '*****' **** to ***** ****. 

***************

*********** ***** *****, ***** ***** ****** **** ** **** ** *** to ****** ******** ******** ***** **** ** *** *** ********:

  • ******** *****:******* ***** ****** * ******** *** ****** ******* ****** ** security *** *** ****** ***** ********* ** '*****' *********** **** video ************ *** ****** ***** *** *** ***** ** ****** attempts.
  • ***** **** ********: *** **** ** ****** ********* ******** ** *** ***** ** recommend ***** **** ** ******* ***** ******* ** **** *** security.
  • ** **** ********:******* ***** *** ******* ***** ***** **** ***** *******, **** should ** ******* ** '**** ********' ******* ****** ** ********** or ************* ****** *******. ***** *** **** ** *****, ***** it ******** ** *** **** ****** *** ***** **********.

Brute *****: *** **** ****

***** ***** ***** ***** ***** ************* **** *** **** **** standard ***********, *** ******* ****** ** ********** ***** ******* *************** brute ***** *******. ***** ***** **** *** ********** ** ******, most ******* **** *** **** *** **** *** **** *** knowledge ** ******* ****, ****** ******** ******* ** ****** *** opening ******. 

*** ********* ***** ***** ***** ***** ****** ** ****** ** part ** * ****** ****** ** ********** ******* '******** ********' of *** ****** *******. ** ** ******** ****** **** ***** through ******** * ********** *** *** ****, *** ********* *** use ***** ***** ** ***** **** *** ****, **** *** issue ** ********.

Comments (8)

The technical advantages of having a single, integrated, intelligent IP device at the door are manifold. But what will drive adoption is simply cost savings (which is potentially more attractive than modeled in this very good article). Security is a matter of degree, not absolute. I expect the inevitable additional functionality and lower cost will prevail over perceived security vulnerabilities which can be effectively mitigated.

We currently have our multi-door microcontrollers in close proximity to the BA/FA alarm control panel and recieve an input signal in the micro's when there is a fire alarm. The exterior doors then unlock to assist firefighters with access. How would this work with the controllers at the door?

Hi

There are ways to do this:

The Maglock can be controlled by an independent power supply. The Alarm/Fire system can activate that relay in case of fire to open the door...

The Fire Alarm dry contact signal can be translated into a digital signal to the server signaling it to open the door.. We don't like this idea but it is doable

If the door/controller powers the Maglock through PoE, then have the Fire Alarm relay cut power to the PoE switch thereby removing power fomr the controller, hence the Maglock...

As for tampering with the Reader/comtroller to removepower fromthe Maglock, we use ISONAS and they have adevice that effectively address the tampering isue...

I was looking at some all-in-one units for home use, from Samsung and Dahua. They typically look like this:

I believe in these that the reader, controller and strike are all in one unit. After reading the article, I am thinking that having the strike integrated may actually be a good thing, since it makes it harder to attack the leads which control the strike.

Is that right or are there new vulnerabilities that are introduced?

Units like you list above do not use an electric strike. The lock latch is retracted or the handle retracts the latch when the lever handle is turned.

Think of a 'hotel style' lock. That is essentially what your standalone unit examples are.

Ok, let me have the bad news, what sucks about them? :)

No need to reply, found this excellent article:

Hotel Access Control Explained

Nice article. Thank you for exploring the risk issues.

A point you didn't address is the case where there's now IP outside the door. If the thing is PoE powered or has a LAN connection, there's the added issue that the net could be the target. Yes, we still bring Bubba to use the prybar but now after that even the low end thieves have a kid on the team with a Rasperry Pi and a a 12 volt battery in their backpack, ready to do rude things over the network drop. There are reports of people accessing devices outside the building for net access, I don't think that's too far-fetched.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Camera Focusing Tutorial on Aug 09, 2018
A camera's focus is fundamental to quality imaging. Mistakes can cause important problems. In this guide, we explain focus issues and proper...
RealNetworks Free School Facial Recognition on Aug 03, 2018
The company that created RealPlayer is moving beyond media delivery and into the security space with a new facial recognition platform they have...
Installing Surveillance Cameras Into Synthetic Stucco (EIFS) Tutorial on Jul 30, 2018
Mounting cameras into synthetic stucco, commonly known as EIFS finishes, can be problematic If not properly planned, EIFS/stucco can be downright...
Door Swing Tutorial on Jul 24, 2018
The direction a door swings might seem minor, but it can greatly impact door hardware selection. There are four basic ways a door can swing, and...
Improved Security And Surveillance Bidding - 2018 MasterFormat Divisions Examined) on Jul 19, 2018
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Belgium Bans Private Facial Surveillance on Jul 06, 2018
Belgium has effectively banned the use of facial recognition and other biometrics-based video analytics in surveillance cameras for private,...

Most Recent Industry Reports

Chinese OEM Avycon Gets ADI Push on Aug 15, 2018
Who is Avycon? An American company? A Korean company? A couple of guys relabelling Chinese products? The latter is the best explanation. While...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Genetec Stratocast / Comcast 'Motion Insights' Examined on Aug 15, 2018
Comcast recently announced "SmartOffice Motion Insights", an extension to their Genetec OEMed cloud video service (covered by IPVM here). This...
SimpliSafe Violating California, Florida, and Texas Licensing Laws on Aug 14, 2018
IPVM has verified that DIY security system provider SimpliSafe, founded in 2006 and acquired in June of 2018 at a billion dollar valuation, is...
Ban of Dahua and Hikvision Is Now US Gov Law on Aug 13, 2018
The US President has signed the 2019 NDAA into law, banning the use of Dahua and Hikvision (and their OEMs) for the US government, for US...
Cut Milestone Licensing Costs 80% By Using Hikvision and Dahua NVRs (Tested) on Aug 13, 2018
Enterprise VMS licensing can be quite expensive, with $200 or more per channel common, meaning a 100 camera system can cost $20,000 in VMS...
Nortek Sues SDS, Battle Over Unpaid Bill and Cancelled Lines on Aug 13, 2018
Nortek and SDS legal battle continues. As IPVM reported, SDS sued Nortek alleging bribery and antitrust violation. However, Wave fired back at SDS,...
Uniview Intrusion Analytics and VMD Tested on Aug 13, 2018
IPVM's IP Camera Analytics Shootout featuring Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision created some ill will with a Uniview distributor who...
ADT Employees Protest ADT CEO on Aug 10, 2018
So many ADT employees were so upset with ADT's CEO speech reported on by IPVM, that ADT's CEO was forced to send a mass email to employees to...
Axis / Avigilon Legal Battle Rises on Aug 09, 2018
In what is shaping up to be high-powered, will-not-back-down battle, Axis and Avigilon are squaring off in multiple legal contests. In 2017, IPVM...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact