HID vs NXP Credentials

Author: Brian Rhodes, Published on Sep 12, 2013

Two companies dominate the global market for access control credentials: HID Global and NXP Semiconductor. Both companies own or influence huge chunks of the credentials game, so which one should you choose? In this note, we explain how their offerings differ, interoperate, and how the choice impacts system selection.

Credentials Dominated by Giants

******* ** ***** ******** ** *** *********** ***************** ********* ** ******************* *** *** *************.

*** ********

***** *** ****** ***** ********* **** **** '*********' *********** ** the *** ****'*,*** ********** ** ********** **** **'* ****** "****" *********. ***** ***** ********* ** *********, *** ******* ****** '*** *********** *****' *** * **** swath ** *** ******** ******, *** **** ******** *** ****** brands **** *****, *********, *** *******. *** *******'* ****-***** ******* include:

  • "*********": ** ***** ************, *** ***** ********* **** *** ********* **** ** *** systems
  • ******: ** *** ****** ******** **.** *** '*********'

*** ** *** '*******' ****** *** *********** ** *** **. Because ** ********** ****** *****, *** ** **** ** ******* the *** ** *** ********** ******* ** * ******* ** credential *** ****** *************. **** **** ********* ******* '*** ***** compliant' *********, *** ******** ******* "**** *" ********* (** **** "A" - ********* ** **** ****** *****).

*** ********

******** ******** *************,******-***** ********* * ****** ** '***********' ********** ********** **** ** * number ** ******* - ********, *******, *** **********. **** ********** adoption ** *** ********* ** ********** *************, *** ****** * catalog ** ***** ***** ** ****, *********:

  • ****** ****: ***'* ************ ***** ** ***** ****** ** *** *********, *** *** as ****** ******* ** ***'* "*********" *****
  • ******/*******: ** *** ********* ***** *** '*********' ******, **** ********* on **.** *** *** '*******' ******* *** ********** ** *** early ***** ** *********** *** ****** **** '****** *******' ***********. DESFire *********** ******* ******** ********** **** ******** ****** ********** *****. The '*******' ****** **** ***** ******** *** *************** ** ***** *******, *** ******* ********* **** ******. ******* ***** ************ **** made **** ** ***********, *** ******** ****** ******* ***** ***** be ****, *** *** ****** ****** ***** ** '******/*******'.

****** ***, ***'* ********** ******* *** '*******-****' *** *** ********* standards *** ********* *** ********** *** *** ** ****.  *** manufacturers *** *** ***** ******* ** "**** *" *********.

***** ***********

** * **** ******* ******, ***** ****-***** **** ******* ************ pop ** ** ******** ****** *******, *********:

  • **************.***: **-******* ***** **** ******, ********** **** *** ******* ****** credentialing ***** ** .*** *********
  • **** ******: ********** *** ** *****, ********** *** ******** ********* ******* (mass *******, *******)

***** *** ****** **** ** ****** *******, ***** ******* ********** the **** ******* **** *** *** *** **** ***** ******* of ***** ** ** *** '****** ******'.

US ** *** *****

******* ** *** **************'* ******** ** **** *** *** **** ** *********, ******, *******, *** *** ********** derivatives *** ******* ***** **** ********** ******* *** **.

*******, *** ******'* ********* ******* *** ** *** ********, ********** in *** **. ******* *** ********** **** ** ********* ********* *********** and *******,*** ******* **** ******** ******* **** **** *** ********** *** formats*** *** ***** ** ******* *********** ** * ******.

The ***/*** ***** ********

**** ****** ********* ***'*********** ***'* ****** *********, *** ** *** *** ********* ************** of ** *** ********, **** ***** '****' *** **** ** most *******. *******, ******* ***** ******** ** *** ******** **** room *** ***************, *** *** *** ******** ***** '*********' ********* with * ********* ********** *********.

*** *** ****** ** **** ** **** ******** ** ********** claim '*** ***** **********', *** *** *** ******** ***************. ** ********* **** **********, ISO ******* ***** ** ******* ***** '****/** *' ** ********* *** *** *********. **** ******* ** these ***** *** ******** ****** '*****', *** *** ******* **** is ********** ******* *** ***.

** *******, ******* ***** ** ** ********* **** ** ***** 'Part *' *********, **** ***-**** *** *** ******** ***** ****.

 

*********, ******* ******** ************ ** *** ** ** **** ******* with * ******* ****** ****** ******* *** ** '**** *' compliance **** ***:

*******, *********** ***** '*****' * ****** ** ********** ** ********* with ** *** ****** ******, *** ********** * ******** *****/**** of ********** *** ** **** ** ********.

****************

***** *** '**** * & *' ******** ** *** ***** separates ******* **** ***** *** ****, ** **** *** ****** mean **** *** ******** **** **** *****. ******** ** *** 14443 *** *** **** ** **** *****, ********* *** '**** Serial ******'. *** **** ****** *******, **** ** *** ****** number **** ********** ****** *****, *** ******* **** ****** ** not *******, ** **** ******** ** '*** ********' *******:

  • ***/*** ******:*********** *** ****'* ****** ********** ** ******** ******* ** ** not ****** ** *** **** '*********' *****. **** ****** *** platforms *** **** **** ****** ** ****** * ****, *** instead *** *** ******** ******** ** ****** ******, *********, *** privileges.
  • ******* ****/*****:*******, *** **** ******** ** ******* ****** *** **** ** encrypted *** ********** ****** ********* ******* *** ****. ********** *** access ******* ***** *** ********** ****** *** ******* (**: *****, ***** *******) *** *** *****-****** ************** (**: **********) **** ******** ***********, *** ****** *** ** *** sufficient.

System ******

** ***** ** ****** *******, ********** *********/******* ****** **** ****** design. ****** ********* **** ******** *** ********** ******, *** *** subsequent ****** ** **** **** ***** **** **** ******. ** terms ** '****** ********** ********' *********, **** ****** **** *** generally ******, ******* *** ****** ****** ********** ********** *************. ** long ** *** ******** ** ********** **** *** ******, ********** choice ** * ******** ******, *** **** ******* ********** ***** based ** ********* *** **** ** ******** ****** **** ********** difference.

*******, **** **** ******** ** ****, ******* *** ****** ******* they ********* ******* *********** ** *********** ** ****** *******. ******** from *** ****** ** *** ***** *** **** ********* *** affects *** *****, ** ******* *** ********.

Comments (5)

Philips (NXP) introduce Mifare in 1994, it is compliant to ISO 14443A, parts 1-3 while DESFire was introduced in 2002, it is compliant to ISO 14443A, parts 1-4. iClass, using Inside Contactless's chip, was introduced in 2002, it is also partially compliant to ISO 15693, primarily to operate at lower speeds over longer ranges, or, the majority of installations.

Compliance does not mean interoperability. ISO standards (ISO 14443 and 15693) do not specify: Encryption use, Key Management, IC's memory structure, memory access or application data structure which are rather important unless you are using the CSN for access control. When reading a brochure, just becuase it lists "support" for NXP Mifare, HID iClass, Legic advant, or Sony FeLica does not mean the reader is reading anything other than the CSN per the ISO standard.

ISO14443A uses 100% modulation, meaning that the reader stops emitting the field for defined periods of time. The modulation for ISO 14443B is only 10% which preserves the continuity of the clock. There was an attempt by Sony to specify FeliCa as "ISO 14443 Type C", but is now standardized under the NFC umbrella specification ISO 18092.

Just a quick question. Do I need to understand the different ISO standards in order to know what cards will work with what reader. I am not an engineer and am trying to grasp what will work with what.

Feedback welcomed. Thanks.

Agreed - I am in the same position and have the same question. I think the main point is that compliance does not mean that there will be interoperability and to look beyond what a product 'states' which credentials it supports. Hence, why Mifare and DESFire readers won't necessarily support HID iClass even though they both meet ISO 14443A standards. Possibly?

Only portions of the total data load may be read depending on which ISO14443 part is supported. Take a look at this HID chart:

(I've highlighted details in red)

Notice how support varies depending on which ISO14443 part is used.

There is provisional (very simple) support for iClass readers in both parts. The 'CSN', or 'Card Serial Number' can be read if either part is supported.

However, the 'CSN' does not use the encryption benefits of the card, and is essentially a unique number and nothing more. If the benefits of iClass are to be used, the card must be ISO14443 Part B.

Despite many products claiming 'ISO14443 compatible', on closer examination parts A & B further divide 'how compatible' they truly are.

This section is much like the Credentials Guide in the first part of the class. Emphasizing the nonexistence of interoperability of a credential unless both reader and credential utilize the same ISO standard is a great point.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
Alarm.com Business Market Expansion on Apr 13, 2018
Alarm.com has millions of subscribers, but the company has traditionally been mostly a residential/home focused offering.  ADC's new Smart Business...
Average Access Control Project Size 2018 on Apr 10, 2018
  The most common access control project size is 5 - 16 doors per project. This 2018 result mirrors previous statistics, most recently in 2016...
ISC West 2018 Access Control Rundown on Apr 06, 2018
For ISC West 2018, what is new and interesting in access control?  This rundown will bring you up to speed on the exhibitors, what they are...
VMS New Developments Spring 2018 (Avigilon, Exacqvision, Genetec, Hikvision, Milestone, Network Optix) on Apr 04, 2018
What's new with VMS software? In this report, we examine new features and releases for Spring 2018 to track different areas of potential...
Forced Door Alarms For Access Control Tutorial on Apr 04, 2018
One of the most important access control alarms is also often ignored. "Forced Door" provides a vital and even critical notification against...
The 5 Major Lock Profiles Guide - Euro, Oval, KIK, Interchangeable Core, Mortise on Apr 03, 2018
Locks are used everywhere, but they are not all the same. In fact, even the shape of the lock changes, sometimes for no other reason than...
JCI / Tyco Security Acquires Smartvue on Apr 03, 2018
Johnson Controls (Tyco Security) has acquired cloud provider Smartvue (see recent IPVM Smartvue profile). Smartvue will join Exacq and VideoEdge...
70+ New Products Directory Spring 2018 on Apr 02, 2018
We have compiled a list of new products for Spring 2018 in the categories: Video Surveillance Access Control Fire and Intrusion Other...

Most Recent Industry Reports

Last Chance - April 2018 IP Networking Course on Apr 19, 2018
Today is the last day to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
'Best In Show' Fails on Apr 19, 2018
ISC West's "Best In Show" has failed. For more than a decade, it has become increasingly irrelevant as the selections exhibit a cartoon level...
Security Camera Cleaning Frequency Statistics on Apr 18, 2018
150+ integrators told IPVM how often they clean cameras on customer's sites and why.  Inside we examine their answers and break down feedback...
Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Axis VMD4 Analytics Tested on Apr 17, 2018
Axis is now on its 4th generation of video motion detection (VMD), which Axis calls "a free video analytics application." In this generation, Axis...
Arecont CEO And President Resign on Apr 17, 2018
This is good news for Arecont. Arecont's problems have been well known for years (e.g., most recently Worst Camera Manufacturers 2018 and starting...
Strong ISC West 2018, Says Manufacturers, GSX / ASIS Expected Weaker on Apr 17, 2018
Manufacturers say ISC West 2018 was strong, continuing the trend we have seen in 2017 results and 2016 results. However, those same 100...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
Best and Worst ISC West 2018 on Apr 16, 2018
ISC West 2018 had strong attendance, modest overall new products, and a surge in Artificial Intelligence marketing. First, here are 20+...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact