How To Troubleshoot Wiegand Reader Problems - Inverted Wiring

By: Brian Rhodes, Published on Jul 16, 2019

Wiegand is the dominant method of connecting access readers, but problems can arise for installers.

In fact, one of the most difficult reader installation issues to troubleshoot is caused by wiring it wrong.

However, inside we explain how to find the wiring issue using an app, making it possible to diagnose over the phone.

Strange Card Numbers Common Problem

Often, access installers will report issues such as 'All but one of the card readers installed report the correct card number. Cards work on all but that one reader!' 

A significantly confusing aspect is the cards function as expected elsewhere. The reader works as expected otherwise except for reporting strange credential numbers, seemingly unrelated to the actual number every time they are used.

Here's an example of this type of issue, captured on a social media group:

The problem often results in dispatching a technician to the site, and can lead to the (ultimately unneeded) replacement of readers and/or credentials, costing hundreds of dollars.

Below we explain how to troubleshoot the issue using Windows Calculator over the phone.

******* ** *** ******** method ** ********** ****** readers, *** ******** *** arise *** **********.

** ****, *** ** the **** ********* ****** installation ****** ** ************ is ****** ** ****** it *****.

*******, ****** ** ******* how ** **** *** wiring ***** ***** ** app, ****** ** ******** to ******** **** *** phone.

Strange **** ******* ****** *******

*****, ****** ********** **** report ****** **** ** 'All *** *** ** the **** ******* ********* report *** ******* **** number. ***** **** ** all *** **** *** reader!' 

* ************* ********* ****** is *** ***** ******** as ******** *********. *** reader ***** ** ******** otherwise ****** *** ********* strange ********** *******, ********* unrelated ** *** ****** number ***** **** **** are ****.

****'* ** ******* ** this **** ** *****, captured ** * ****** media *****:

*** ******* ***** ******* in *********** * ********** to *** ****, *** can **** ** *** (ultimately ********) *********** ** readers ***/** ***********, ******* hundreds ** *******.

***** ** ******* *** to ************ *** ***** using ******* ********** **** the *****.

[***************]

Card **** ***** ** *******

*** **** ****** *******, only ***** *********** *** used ** ******** ***********. Even *** ******** **.** MHz ***********, ***** *** only ******* ** **** on *** **** **** to ********* ***** ** called * '**** ****** number', ** ***.

**** *** ** ***** the **** ****** *******, embossed, ** ****** ** the ****. ** *******, every ****, *** ************* user, **** *** * 'unique' ******.

*** ***** ***** ***** example *** ******** ** credentials:

Problem **** *****: ******** ****** ******

*** ************ ********** ******* reader *** **** ********** must ** ***** ********* for *******, ******** ********** data ** ** ****** between *******.

*** *** ******** ** access *******, **** ********** uses *** ********* *****: generally *** '*****' *** 'white' ****** *****, ******** called *** '******* *****'. Some ********** *** ** observed ** ***** *******, but **** *** ***** readers ************ *** ***** conductors *** ******* ***********.

*** ***** ***** ***** connect ** ****** *** crucial ** ****.  ** general, ******* ***** *** connected ** *** '**' and '**' *****, *** the **** *****/******** **** be ********.

**** **********, **** *********** ones, ********** ***** *** 'D0/Green' **** ** *** 'D1' **** *** ** on, ******* * *** problem **** ** **** to ****** ** * casual ****:

Diagnosing ******* ***** ******* **********

****** **** ************ *** wiring ********, *** ******* for ******** **** ****** wiring ******* *** ** done **** * ******* PC ** **** ********/**** the ***** **** **** the ********** ******* ********** by *** ****** *** the ****** ********** ****** on *** **** ******.

*** **** **** ******* is *************** *** **** 'free' ******* **********, ******** any *********** **** ******** decimal ******* ** ****** can ** ****.

*** ***** ***** ***** Windows **********:

  1. ** * **, *********** ********** ** '**********' Mode
  2. **** ** *** ******/*** credential ***** (******* '*****')
  3. ***** *** ****** (***) value (******* '**** **** 0101 ****')
  4. ***** *** ******* ****** value ** **** ****** back **** **********. ******* all '*' **** '*' and **** *****. (******* '0101 **** **** ****')
  5. ***** *** ******* (***) value ** *** ** it ******* *** ******* credential ***** **** ******* on *** ****. (******* '23713')

** *** ******* ***** in **** * ******* the ****/ **** ****** be **** ** *** reader, *** ** *** D1 ***** *** ******** or *********** **********.

*** ******* ** ******* fixed ** ******** *** wires ** ** ** the ******* *****, ******** the **********, ********, ** termination ****** *** ******** Wiegand ******.

Video ***********

*** ***** ***** ************ the *******, ** ** use ******* ********** ** Binary **** ** ***** inverse ****** ** *** system ******* **** ***** values ****** ******** ****:

Wiegand **** ******

*** ******* ***** ****** on *******, ***** ****** binary, ** ******** ********** information ** ****** ***********.

** *******, ******* *********** use *** ***** ** communicate **** ******. **** dormant, **** ** *** two *****, ** (*****) and ** (*****) **** a **** ******* ** 5 *** ** *** line.

**** **** ** **** by *** ****** **** a ********** ** ****, the **** ******* *********** drops ** * ***. This **** ** ********** as ****** * '*' or '*' ****** ***** based ** ***** **** the **** ** ****:

****** ******* ** *********** values, ***** ******* *** either '*' ** '*' and *** *** ******* or *********. 

******* ***** ****** *** basic ******, ********** ******** up *** ***** ********** registers **** ** *** wrong ****, ***** ******* a *********** *****, *** access ****** ******* ******.

Does *** **** *** ****

** ****, *** ****** above **** *** **** for *************** **** ********* readers, **** *******.

*****~**% ** *********** ****** they *** ******* *** majority ** *** ****, *** ******* *** ********* nature ** **** ***** that ******, *********** ****** is ** ****** ****.

*************, *** **** ******* uses ****** ** **** one ** *** **** troubling ******** *****, ********** to '*** ** *** middle' ******** *** $** ****** ** ******* ******* **** **** **** details ** ********** ******* often *******$** ** ****.

Comments (5)

Some more calculator fun.

Hey thanks!  That's cool.  

Basically that document explains how individual card values can be extracted from hexadecimal values using Windows Calculator. This is useful if you need to 'dissect' the records in raw user database or some other manual task.

Some more general nerdiness and geekwit across multiple platforms. Did not know where to plug this one since it is not the typical security industry topic however there are other connections to be made with security and hardware. Connect the dots within the box.

https://pagedout.institute/download/PagedOut_001_beta1.pdf

No need to mess about with hex or binary here, nor getting the number and swapping 0s and 1s.
Simpler to subtract the number from 65535
65535-41822=23713
65535-65523=12

Obviously that doesn't explain why it is wrong, and why this fixes it.

Its Complicated to work in HEX, normal installer doesnt have this info

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...
UK Stands Behind Hikvision But Controversy Continues on Feb 18, 2020
Hikvision is exhibiting at a UK government conference for law enforcement, provoking controversy from the press, politicians, and activists due to...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan startup IronYun has raised tens of millions for its "mission to be the leading Artificial Intelligence, big data video software as a service...