HID vs NXP Credentials

Author: Brian Rhodes, Published on Sep 12, 2013

Two companies dominate the global market for access control credentials: HID Global and NXP Semiconductor. Both companies own or influence huge chunks of the credentials game, so which one should you choose? In this note, we explain how their offerings differ, interoperate, and how the choice impacts system selection.

Credentials Dominated by Giants

******* ** ***** ******** ** *** *********** ***************** ********* ** ******************* *** *** *************.

*** ********

***** *** ****** ***** ********* **** **** '*********' *********** ** the *** ****'*,*** ********** ** ********** **** **'* ****** "****" *********. ***** ***** ********* ** *********, *** ******* ****** '*** *********** *****' *** * **** swath ** *** ******** ******, *** **** ******** *** ****** brands **** *****, *********, *** *******. *** *******'* ****-***** ******* include:

  • "*********": ** ***** ************, *** ***** ********* **** *** ********* **** ** *** systems
  • ******: ** *** ****** ******** **.** *** '*********'

*** ** *** '*******' ****** *** *********** ** *** **. Because ** ********** ****** *****, *** ** **** ** ******* the *** ** *** ********** ******* ** * ******* ** credential *** ****** *************. **** **** ********* ******* '*** ***** compliant' *********, *** ******** ******* "**** *" ********* (** **** "A" - ********* ** **** ****** *****).

*** ********

******** ******** *************,******-***** ********* * ****** ** '***********' ********** ********** **** ** * number ** ******* - ********, *******, *** **********. **** ********** adoption ** *** ********* ** ********** *************, *** ****** * catalog ** ***** ***** ** ****, *********:

  • ****** ****: ***'* ************ ***** ** ***** ****** ** *** *********, *** *** as ****** ******* ** ***'* "*********" *****
  • ******/*******: ** *** ********* ***** *** '*********' ******, **** ********* on **.** *** *** '*******' ******* *** ********** ** *** early ***** ** *********** *** ****** **** '****** *******' ***********. DESFire *********** ******* ******** ********** **** ******** ****** ********** *****. The '*******' ****** **** ***** ******** *** *************** ** ***** *******, *** ******* ********* **** ******. ******* ***** ************ **** made **** ** ***********, *** ******** ****** ******* ***** ***** be ****, *** *** ****** ****** ***** ** '******/*******'.

****** ***, ***'* ********** ******* *** '*******-****' *** *** ********* standards *** ********* *** ********** *** *** ** ****.  *** manufacturers *** *** ***** ******* ** "**** *" *********.

***** ***********

** * **** ******* ******, ***** ****-***** **** ******* ************ pop ** ** ******** ****** *******, *********:

  • **************.***: **-******* ***** **** ******, ********** **** *** ******* ****** credentialing ***** ** .*** *********
  • **** ******: ********** *** ** *****, ********** *** ******** ********* ******* (mass *******, *******)

***** *** ****** **** ** ****** *******, ***** ******* ********** the **** ******* **** *** *** *** **** ***** ******* of ***** ** ** *** '****** ******'.

US ** *** *****

******* ** *** **************'* ******** ** **** *** *** **** ** *********, ******, *******, *** *** ********** derivatives *** ******* ***** **** ********** ******* *** **.

*******, *** ******'* ********* ******* *** ** *** ********, ********** in *** **. ******* *** ********** **** ** ********* ********* *********** and *******,*** ******* **** ******** ******* **** **** *** ********** *** formats*** *** ***** ** ******* *********** ** * ******.

The ***/*** ***** ********

**** ****** ********* ***'*********** ***'* ****** *********, *** ** *** *** ********* ************** of ** *** ********, **** ***** '****' *** **** ** most *******. *******, ******* ***** ******** ** *** ******** **** room *** ***************, *** *** *** ******** ***** '*********' ********* with * ********* ********** *********.

*** *** ****** ** **** ** **** ******** ** ********** claim '*** ***** **********', *** *** *** ******** ***************. ** ********* **** **********, ISO ******* ***** ** ******* ***** '****/** *' ** ********* *** *** *********. **** ******* ** these ***** *** ******** ****** '*****', *** *** ******* **** is ********** ******* *** ***.

** *******, ******* ***** ** ** ********* **** ** ***** 'Part *' *********, **** ***-**** *** *** ******** ***** ****.

 

*********, ******* ******** ************ ** *** ** ** **** ******* with * ******* ****** ****** ******* *** ** '**** *' compliance **** ***:

*******, *********** ***** '*****' * ****** ** ********** ** ********* with ** *** ****** ******, *** ********** * ******** *****/**** of ********** *** ** **** ** ********.

****************

***** *** '**** * & *' ******** ** *** ***** separates ******* **** ***** *** ****, ** **** *** ****** mean **** *** ******** **** **** *****. ******** ** *** 14443 *** *** **** ** **** *****, ********* *** '**** Serial ******'. *** **** ****** *******, **** ** *** ****** number **** ********** ****** *****, *** ******* **** ****** ** not *******, ** **** ******** ** '*** ********' *******:

  • ***/*** ******:*********** *** ****'* ****** ********** ** ******** ******* ** ** not ****** ** *** **** '*********' *****. **** ****** *** platforms *** **** **** ****** ** ****** * ****, *** instead *** *** ******** ******** ** ****** ******, *********, *** privileges.
  • ******* ****/*****:*******, *** **** ******** ** ******* ****** *** **** ** encrypted *** ********** ****** ********* ******* *** ****. ********** *** access ******* ***** *** ********** ****** *** ******* (**: *****, ***** *******) *** *** *****-****** ************** (**: **********) **** ******** ***********, *** ****** *** ** *** sufficient.

System ******

** ***** ** ****** *******, ********** *********/******* ****** **** ****** design. ****** ********* **** ******** *** ********** ******, *** *** subsequent ****** ** **** **** ***** **** **** ******. ** terms ** '****** ********** ********' *********, **** ****** **** *** generally ******, ******* *** ****** ****** ********** ********** *************. ** long ** *** ******** ** ********** **** *** ******, ********** choice ** * ******** ******, *** **** ******* ********** ***** based ** ********* *** **** ** ******** ****** **** ********** difference.

*******, **** **** ******** ** ****, ******* *** ****** ******* they ********* ******* *********** ** *********** ** ****** *******. ******** from *** ****** ** *** ***** *** **** ********* *** affects *** *****, ** ******* *** ********.

Comments (5)

Philips (NXP) introduce Mifare in 1994, it is compliant to ISO 14443A, parts 1-3 while DESFire was introduced in 2002, it is compliant to ISO 14443A, parts 1-4. iClass, using Inside Contactless's chip, was introduced in 2002, it is also partially compliant to ISO 15693, primarily to operate at lower speeds over longer ranges, or, the majority of installations.

Compliance does not mean interoperability. ISO standards (ISO 14443 and 15693) do not specify: Encryption use, Key Management, IC's memory structure, memory access or application data structure which are rather important unless you are using the CSN for access control. When reading a brochure, just becuase it lists "support" for NXP Mifare, HID iClass, Legic advant, or Sony FeLica does not mean the reader is reading anything other than the CSN per the ISO standard.

ISO14443A uses 100% modulation, meaning that the reader stops emitting the field for defined periods of time. The modulation for ISO 14443B is only 10% which preserves the continuity of the clock. There was an attempt by Sony to specify FeliCa as "ISO 14443 Type C", but is now standardized under the NFC umbrella specification ISO 18092.

Just a quick question. Do I need to understand the different ISO standards in order to know what cards will work with what reader. I am not an engineer and am trying to grasp what will work with what.

Feedback welcomed. Thanks.

Agreed - I am in the same position and have the same question. I think the main point is that compliance does not mean that there will be interoperability and to look beyond what a product 'states' which credentials it supports. Hence, why Mifare and DESFire readers won't necessarily support HID iClass even though they both meet ISO 14443A standards. Possibly?

Only portions of the total data load may be read depending on which ISO14443 part is supported. Take a look at this HID chart:

(I've highlighted details in red)

Notice how support varies depending on which ISO14443 part is used.

There is provisional (very simple) support for iClass readers in both parts. The 'CSN', or 'Card Serial Number' can be read if either part is supported.

However, the 'CSN' does not use the encryption benefits of the card, and is essentially a unique number and nothing more. If the benefits of iClass are to be used, the card must be ISO14443 Part B.

Despite many products claiming 'ISO14443 compatible', on closer examination parts A & B further divide 'how compatible' they truly are.

This section is much like the Credentials Guide in the first part of the class. Emphasizing the nonexistence of interoperability of a credential unless both reader and credential utilize the same ISO standard is a great point.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Princeton Identity Access 200 Iris Scanners Examined on Jun 05, 2018
Iris recently registered a big jump as a preferred biometric in our Favorite Biometrics survey, but access-ready options can be difficult to...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...

Most Recent Industry Reports

IFSEC Show Report - Live From London on Jun 19, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Axis Guardian - Cloud VMS for Alarm Companies on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
July 2018 IP Networking Course on Jun 16, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Hikvision 12MP Fisheye Camera Tested (DS-2CD63C2F-IV) on Jun 14, 2018
Hikvision's DS-2CD63C2F-IV is their flagship panoramic camera, with a 12MP imager, 15m integrated IR, smart codec, and more. We tested the 63C2 in...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact