Contactless Access Credentials Guide

By: Brian Rhodes, Published on Oct 29, 2018

Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences exist.

Choosing the correct one can be the difference between a secure facility and wasting significant money. Understanding how they operate and what their specifications mean is a big challenge.

** **** ******, ** cover *** ***** ******** needed ** ******* *** right *********** *********** ***** time, *********:

  • *** **. *** ********** Formats
  • *** *** **. **.** MHz ***********
  • ******** *****
  • ******** *****
  • **** **/****** *******
  • *** ****** **. ******
  • **** *******

Credentials ********

***** ***** ********** ******* exist, *** **** ****** choice ** **** '***********' types. ****** **% ** systems *** *********** ***** or **** ***** ** unpowered ******* **** *** excited *** **** **** brought ***** ** * reader ****. **** '******** power' ******* ** ************** ****** ********. *** ******* ** demonstrated *************** ** ************ *********:

** ***** *** ******* principle ** **** ** our ********* ******* ********, ******* *** ****** itself ***** * ***** collected ** *** ****, eventually ******** ****** ** a ****** **** *********** powers * ******** **** transfer ******* *** ***. The ***** ***** ******* typical ******** ********** ** the ****, ***** *** wire ******* ******** ******, the ********* ****** **, and **** **** ********** ICC **** (**********) **** back ******* *** ******* to *** ******:

** *******, *** *********** credentials **** **** *** but *** ***** ********** like ********* *********, **** of ********** ****, **********, and ****** ** *** data ******* **** ** the *****. ** *** sections **** ******, ** examine ***** ********** ** depth.

Contactless *********** ********* ** ******

*** ** *** ******* differences ** *********** *********** is *** ****** ** the **** ** ********, typically ********** ** *** manufacturer. ******* ** *****-******** of *********** *********** *** ******* ********* ** ******** ** *** ****** *** *** *************.

*** ********

***** *** ****** ***** migrating **** **** '*********' credentials ** *** ***** 1990's, HID ****** ****** *********** **** its *** *** "****" *********. *** **** of **** *****, *** *** ****** the **** ****** ******** market ********** ********, *** OEM ** ******** *** access ****** ********* *****, Honeywell, *** *******. *** company's ****-***** ******* *******:

  • "*********": ** ***** *** *** ******, *** ***** ********* used *** ********* **** in *** *******
  • ******: ** *** ****** specific **.** *** '*********'

*** ** *** **** common ****** *** *********** in *** **. ******* of ********** ****** *****, HID ** **** ** license *** *** ** its ********** ******* ** a ******* ** ********** and ****** *************. **** when ********* ******* '*** 14443 *********' *********, *** strictly ******* "**** *" standards (** **** "*" - ********* ** **** detail *****).

*** ********

******** ******** *************, ******-***** *** ****** a ****** ** '***********' credential ********** **** ** a ****** ** ******* - ********, *******, *** industrial. **** ********** ******** of *** ********* ** credential **************, *** ****** a ******* ** ***** built ** ****, *********:

  • ****** ****: ***'* *** *** ****** ***** ** ***** drafts ** *** *********, but *** ** ****** adopted ** ***'* "*********" lines
  • ******/*******: ** *** *********-***** NXP '*********' ******, **** operating ** **.** *** The '*******' ******* *** introduced ** *** ***** 2000s ** *********** *** format **** '****** *******' credentials. ******* *********** ******* stronger ********** **** ******** higher ********** *****. *** 'Classic' ****** **** ***** scrutiny *** ***** ********** ** snoop *******, *** ******* countered **** ******. ******* these ************ **** **** only ** ***********, *** existing ****** ******* ***** still ** ****, *** new ****** ****** ***** as '******/*******'.

****** ***, ***'* ********** formats *** '*******-****' *** the ********* ********* *** available *** ********** *** for ** ****. *** manufacturers *** *** ***** product ** "**** *" standards. ***'* *********** ** largest ******* *** **, mostly ********** ** *** early (******** ** ~****'*) adoption ** *** ****** formats ****** *** **, but *** *****'* ******* are ***** *** ******* ones **** ** ****** and **** *** ******** access *******.

US ** *** *****

******* ** *** **************'* strength ** **** *** the **** ** *********, MIFARE, *******, *** *** associated *********** *** ******* outside *** **.

*******, *** ******'* ********* markets *** ** *** Americas, ********** ** *** US. ******* *** ********** cost ** ********* ********* credentials *** *******, *** ******* also ******** ******** **** use *** ********** *** formats and *** ***** ** greater *********** ** * result.

125 *** ** **.** ***

*** **********'* ** ********* factors * *** **** in *** ***********. ******* readers *** **** **** credentials ********* ** ******** matching ***********, **** ********* is *** ***** ** consider. ** ** ******* in *** **** ****** ********, ** ********* *** format ** *** *****, credentials *** ****** *** read. *** ***** ***** shows *** ********* ** popular *******:

******* *** ******* ********** between *** *** *** 13.56 *** *********** ** credential ********. ** ** addressed ** ******* **. ****** ****, *** *** ******* do *** ******* ********** and *** ****** ******* or *******. *******, **.** MHz ******* *** ********* (usually *** *** *** or *******) *** ********** data *** **** ** read ** * ****** that ** ************ ***** *** key ** ** **.

Deciphering ********** *****

*** ** *** **** challenging **** *** *********** and *** ***** ***** is ****** *********** ***** credential * ****** ** using. *** ****** ** crowded **** ******** ** options **** ** ********** of ************* *** ***** that *** ****** ** be * ***** ***** card. *** ***** ***** details **** ********* ********** types **** ************ ********* performance *** ******** ***************, yet **** *** **** the **** ** *** untrained ***:

*** *********** *****, *** must **** ***** ********** that *** *** ********* clearly ******* ** ******* labeled ** *** **********:

  • ****** ****: **** ********** *** *** how **** **** *** credential *********, ******* ******* by ** *** ******** for ******* *******. *** example ****** ** *** typical ** *** ******, H10304 ** ***'* ******* 37 ***, *** ** on. *** **** *** to ******* *** ****** used ** * **** is ** ****** * box ***** ** ******** cards (*** ***** ***** 'Card ****** *******'), ** use ** ****** ********** (*****'* ******* ******) ** interpret *** *** *********** output ** * ******** format. ** **** ***** are *** *********, *********** the ********** **** **** by ******** *** ****** used ** *** ****** ******* ********** ******** application, ********* ** *** cardholder *** ****** ************* settings.
  • ******** ****: **** ********* ** NOT ******* ** *** card ** **** *****. This ***** ** *********** is **** ********* ***** on *** ****** *** can ** ******* ***** the **** ****** *********** for ****** ****. ** certain *****, ****** ******* must ** ********** ** accept ******** ******** ***** and **** ***-*** ******* may ***** ********** ***** to *** ******** ******. Without ******* **** ****, credentials *** *** **** to ****.
  • **** **/****** ****** (***/***): ** **** *****, the ** ****** ** embossed ** ******* ** the ****. **** ****** is *** '****** **' that **** * **** to * ******** *****. While ********** ******* *** not ** *****, ********* numbers ***, *** *** same **** ** *** Facility ***** ********** ****** be ****** ***** ** the **** ******. *** image ***** ***** 

*************, *** ***** *****/***** Number *********** ******* ** the **** ** ***** not **** ** *** access ****** ** *** and ** **** ******* to ****** ** *********** the ****** ** *** card ** ******* ** a ******** ***********, *** user, ** ******.

** **** *****, * card ****** ** *********** will '****' ** ******* card *** * ***, but **** ****** ***** may **** ******* ******** days.

*****, *** *** *** cards currently ** ********** ** often *** ********, ******* way ** ****** *** three ****** ** **** information, ** *** * reordering **** ******, ** shown *****:

The ***/*** ***** ********

**** ****** ********* ***'* ****** **** ***'* ****** *********, and ** *** *** ambiguous ************** ** ** ISO ********, **** ***** 'look' *** **** ** most *******. *******, ******* early ******** ** *** standard **** **** *** differentiation, *** *** *** designed ***** '*********' ********* with * ********* ********** structure.

*** *** ****** ** both ******** ** ********** claim '*** ***** **********', *** *** *** entirely ***************. ** ********* this **********, *** ******* 14443 ** ******* ***** '* ***/** *' ** ********* the *** *********. *** default, ***** ****** ****** of ***** ** ******** in **** * & B *****, *** *** encoded **** ** *** card ** ********** ******* the *** ******* *** original ******** **** **** for ************** *********.

** *******, ******* ***** is ** ********* **** in ***** '**** *' standards, **** ***-****, ***-** target ******, *** *** reader ******** ***** ****. However, ******* ******** ************ in *** ** ** from ******* **** * broader ****** ****** ******* use '**** *' ********** common ** ***.

*** *******, **** **** reader ******** *****-*, *** not *****-*, ******* ** practical ***** ** **** not ******* ***'* **.** MHz ****** *******, *** does ******* ***'* **.** MHz ******/******* *******:

** ********, *** ****** readers ******* **** '*' and '*' ***** **** the ***-*** ******** '***' such **** ****** **** of *********** **** **** with ***** *******:

13.56 *** ********* ****************

***** *** '**** * & *' ******** ** ISO ***** ********* ******* from ***** *** ****, it **** *** ****** mean **** *** ******** with **** *****. ******** of *** ***** *** the **** ** **** parts, ********* *** '**** Serial ******'. *** **** access *******, **** ** the ****** ****** **** identifies ****** *****, *** because **** ****** ** not *******, ** **** register ** '*** ********' readers:

  • ***/*** ******: *********** *** ****'* ****** identifier ** ******** ******* it ** *** ****** in *** **** '*********' media. **** ****** *** platforms *** **** **** number ** ****** * user, *** ******* *** the ******** ******** ** assign ******, *********, *** privileges.
  • ******* ****/*****: *******, *** **** ******** of ******* ****** *** card ** ********* *** unreadable ****** ********* ******* are ****. ********** *** access ******* ***** *** credential ****** *** ******* (**: *****, ***** *******) and *** *****-****** ************** (**: **********) **** ******** deployments, *** ****** *** is *** **********.

The *** ********

** ***** ** ********, not *** ********** ******* are *********. *** '**** Serial ******' (******* ** ISO *********) *** **.** MHz ***** *** ***** be **** ********** ** underlying ******, ********** ******, or **********. *** *** may ** ****** ** a ****** ** ** the ******, *** *** full **** *** ** the ********** **** *** be *********.

*** ******* ******* **** only * *** ***** and * ******* ** fewer ***********, ***** *** CSN ** *** ******* ID ** ****** *** to *** **** ** enrollment ** ***** **** as ****** ***** *******. However, *** ****-******** ***** where ****** ******** ********** is ******** ** ******** or **** *********** *** used *** ******** ********** systems, ***** **** ** identify ****** *********** ** often *** ********. ******, the ****'* ********* **** is ******** *******.

Form ******

********** ****** *** *** just ******* ** ***** or ****. ** ** cover ** *** ****** ********** **** ****** Tutorial, *** **** *** method ** ******* * credential *** ******* ********, tokens, ****-***** *****, ** even *******.

*** **** ****** ** the ********** ***** ** an ********* ************* ** overall ********** *** ******* life. *** *******, ***** a ***** *** **** may ** ***** ** print ** ** ***** on *** **** **** a *******, ** *** easily ** **** ** broken ** * ***** environment. * *** ***, while ********** *** ******** a ******* **, ** designed ** ** ******* enough ** ********* *****, harsh *********** *********, *** even ********** ** *****.

*** ***** **** ****** choice ****** ** ******** by *** **** *** *** user's ***********, *** *********, all ***** ********** ***** have ******** **** ****** options ** ****.

System ******

** ***** ** ****** systems, ********** *********/******* ****** most ****** ******. ****** selection **** ******** *** credential ******, *** *** subsequent ****** ** **** must ***** **** **** choice. ** ***** ** 'Access ********** ********' *********, this ****** **** *** generally ******, ******* *** reader ****** ********** ********** communication. ** **** ** the ******** ** ********** with *** ******, *** credential ****** ** * marginal ******, *** **** specify ********** ***** ***** on ********* *** **** of ******** ****** **** technology **********.

*******, **** **** ******** is ****, ******* *** costly ******* **** ********* require *********** ** *********** or ****** *******. ******** from *** ****** ** the ***** *** **** thousands *** ******* *** users, ** ******* *** uncommon.

Comments (13)

**** ***** *** **** vulnerability ******* ** ** manufacturers **** ***** ***'*/****'* of ******* ** ***** that ***** *** **** facility **** *** **** sequentially ****** ****?

*****://***.********.***/*****/*****-********-********-*************-********-*****-************/

**** ** * ********** the *****, *** *** saying **** **** *** facility **** *** * valid ***** ****** ** known, ******** ***** ********* valid ************ ** *** difficult?

*******. **** *** +* to *** **** # and ***'** ** **** to **** ** *** identity ** *** **** (lucky/unlucky) ******** ** **** into **** ******* ****** that *********, ***** ****** the ****** **** *** swiped *** ******* **** from.

****'* ** *********** ********.  In **** **********, ** you *** ***-********** **** orders, ** '**********' ********* being ****?

 

**'* ***** **** **** way (** ** **********), and ** ** ********** wrong *** **. * very *** ********, *** a *-**** *******:

#*- **** ****** ******* Systems **** *** ******* limits ** *** ****** of ******** ***** **** the ***** **** ******** only *, *** ****** only ********** ** ** 8. *** ****** *** number ** ******** ******** codes, *** ******.

#*- *** *** **** experience. *** *** *** badging ***** ** ***** 2 **** ******, **** 1 ** ** **** more **********?

#*- **** ************* **** stockpiles ** ***** **** are **********, *** **** these *********** ******** ****? (Boy ***** * **** to ******* **** ** a ***** *** *** issue **** ** ** clients ** *** ***** they'd *** **!)

*'** **** ****** **** enough ** ******** *** old ****** ******* *******. They ******** *** ****** bits ** **** ******** in *** ******* **** that *** ****** **** read ** ****** * 1 ** * * as *** ****** *** card *** ** *** slot.  **** ***** *****, you ***** *** **** serialized **** *** ******** number (** ********* ****** a *** *****) *** a ***-********** ******** ****** that *** ******** ********.  Each **** ******** **** with * *****-********* ***** that *** ****** ** use ** ******* *** cards **** *** ****** because ***** *** ** way ** ********* *** internal ****** **** *** external ******.  *** *** me **** ***, **** was * **** ** the *** ** ******* a ***** ***** ** cards! :-)  *** ***'* lose **** *****!

* *** ****** *** to ** **** ** use *** ***** ***** approach **** **** **** cards **** ******* * trusted ******** *** ***'* just ** ******.

********* * ******* **** old-fashioned ******* **** *****, but *** **** ****** installations ***** ********* ******* such ** ****** ******* and *** ***** ************ of *** ****** ***'* have.

*'** *** *** *********** in ******* *** *** stupid ********* ** * am *** ** *** access ******* ********. ** company *********** ** **** products *** ** ****** security ********* **** * visit ** **** ** our ******* *** * 2 ***** ********. **** use *  *********** **** combined **** ********* **** scanners ** ********* *******.

** *** ** *** with **** ********** **** I *** *** ******** heading ****** * ********** approach, *** **** ******* and ****** ***. *** example ** * **** common *** **?

**'* *** * ****** question ** *** ***** - *** '********** ********' you *** ***** ** typically ****** *****-****** ****** ******* **************.  **** **** ** our *****.

** ***** ** * trend, *********** ************** ** indeed ******** **** ******. Especially ** *********** ** individualy ***** ** ******* improve, ** ******* **** of * **** ******* to *** ***** ** enter ******** *********** - PINs, *****, **********, *** the **** ******.

***** *****

* ** **** *** to ****** ******* ** all *** ******* *** very *********** ***** ** Trinidad *** ****** ** in ******* ** ***** be ****** *** *** and ****** ** ********** access ******* ********.

* **** ****** *** Keri NXT-3R  ******  **** ** a ***** ***** ********** this ****** "********* **** Between ****** *** **** or ***" ******* ** the **** **** *** distributor *******  ***-* "*** KHz ********** / **.* KHz ******" ** * guess **** ** ** enhanced ********* ****...********* *********** is **** **** *** reader *** " ******* to **** *** *** KHz ***********"...

*******

******

**** ****** *** ***** I ******* *** *****. Many *****, **** *** printed ******* ** *** outer *******...

* ***** ** **** cases, ********* *** *****, which ** * ***** for ****.

*******, *** ***** ** able ********* ** ****-***** ********* ***** ** *** misprints.

*** ***** **** *** "Sticky ****" *****. * have * *** ********* that *** *****. *** because ** *** ********* you ******** ** **** have * *** ** turnover *** ******* *** cards **** *** ****. There *** **** ***** of ****. ***** ********* will ***** *** **** quality ***** ** *** cards *** *** *****.

IPVM Image

Read this IPVM report for free.

This article is part of IPVM's 6,545 reports, 882 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
HID Presents Mercury Security & Aero Access Controllers on Aug 25, 2020
HID presented Mercury Security & Aero Access Controllers at the 2020 IPVM...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Directory of 207 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative....
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Dedicated Vs Converged Access Control Networks Statistics 2020 on Sep 10, 2020
Access control is a crucial system where the network used can impact life...

Recent Reports

FaceFirst Problems And Layoff on Oct 01, 2020
FaceFirst, a US company and one of the oldest ongoing facial recognition...
Ava / Vaion Releases Cloud Connected IP Cameras, Verkada Competitor on Oct 01, 2020
Ava (formerly Vaion) announced its new direct-to-cloud AVA Aware IP cameras...
Single Frame Gait Recognition From Michigan State and Osaka University Examined on Oct 01, 2020
Gait recognition has the potential for accurate identification at a distance,...
CDW Sells School District 36 Low-Res, No Blackbody Hikvision Fever Cameras With Federal Funds on Oct 01, 2020
Mega IT distributor CDW sold low-resolution Hikvision fever cameras with no...
Temperature Tablet Shootout - Dahua, Hikvision, ZKTeco, TVT + 5 More on Sep 30, 2020
Temperature tablets, aka terminal or stations, have emerged as a 'low-cost...
New Products Show Fall 2020 Concluded on Sep 30, 2020
IPVM's sixth online show has concluded. The first 2 days of recorded videos...
ButterflyMX Raises $35 Million on Sep 30, 2020
Startup ButterflyMX has raised $35 million for its smartphone based intercom...
Worst Access Control Manufacturers 2020 on Sep 30, 2020
200+ Integrators told IPVM "In the past year, what access control...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...