Keypads For Access Control Tutorial

By: Brian Rhodes, Published on Jul 28, 2020

Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if they were unlocked.

IPVM Image

However, despite the drawbacks, keypads are still one of the most common choices in access today.

With this note, we examine the weaknesses of keypads including:

  • Revealing Buttons
  • Snooping Eyes
  • PIN Sharing is Easy

Inside we offer advice on how to deploy them securely and examine a type of keypad that overcomes glaring weaknesses.

Operation Described

The function of keypads in access control is simple. A door or gate remains locked until the user enters a valid combination string into a nearby number pad, usually a sequence of numbers.

Most access control applications assign each user their own number, called Personal Identification Number (PIN). Unless the user enters a valid combination, the opening remains locked.

Why Use Keypads?

If these input readers are so terrible, why do people use them? The single biggest 'pro' in using keypads is that no external credential is required. There are no cards or fobs to buy, fingerprints to enroll, and template records to manage. A user is given an access code that is presumably memorized or included in other documents, and nothing else is required.

The lack of external credentials results in a lower operating cost relative to 'credential-based' systems.

The Problems

Despite being one of the oldest and most used access readers, keypads have huge vulnerabilities. Worse still, it takes no special tools or skills to exploit these problems. While individual units may be better, or even worse, than others at these shortcomings, the biggest problems are:

  • Revealing Buttons
  • Snooping Eyes
  • PIN Sharing is Easy

In the sections below, we examine these issues and address how they undermine even the best access control platform and most secure locks.

****** ******* ******* **** risks ** **** *** best ****** *******.** ******** **********, ******* let ****** ******* ****** doors ****** ** ** they **** ********.

IPVM Image

*******, ******* *** *********, keypads *** ***** *** of *** **** ****** choices ** ****** *****.

**** **** ****, ** examine *** ********** ** keypads *********:

  • ********* *******
  • ******** ****
  • *** ******* ** ****

****** ** ***** ****** on *** ** ****** them ******** *** ******* a **** ** ****** that ********* ******* **********.

Operation *********

*** ******** ** ******* in ****** ***************. * **** ** gate ******* ****** ***** the **** ****** * valid *********** ****** **** a ****** ****** ***, usually * ******** ** numbers.

**** ****** ******* ************ assign **** **** ***** own ******, ****** ******** Identification ****** (***). ****** the **** ****** * valid ***********, *** ******* remains ******.

Why *** *******?

** ***** ***** ******* are ** ********, *** do ****** *** ****? The ****** ******* '***' in ***** ************* ** ******** ********** is ********. ***** *** no ***** ** **** to ***, ************ ** enroll, *** ******** ******* to ******. * **** is ***** ** ****** code **** ** ********** memorized ** ******** ** other *********, *** ******* else ** ********.

*** **** ** ******** credentials ******* ** * lower ********* **** ******** to '**********-*****' *******.

The ********

******* ***** *** ** the ****** *** **** used ****** *******, ******* have **** ***************. ***** still, ** ***** ** special ***** ** ****** to ******* ***** ********. While ********** ***** *** be ******, ** **** worse, **** ****** ** these ************, *** ******* problems ***:

  • ********* *******
  • ******** ****
  • *** ******* ** ****

** *** ******** *****, we ******* ***** ****** and ******* *** **** undermine **** *** **** access ******* ******** *** most ****** *****.

[***************]

Revealing *******

****** ******* **** *** collect **** **** ****. This ** * **** problem ******* **** *** buttons ****** ** **** access *** *** **** typically ******* ***** ** use.

***** *******

*** ****** ***** *** buttons **** **** ** dirt *** ***** **** the ****'* *******. ** first ******, **** **** buttons **** **** ****, but **** *** **** inexperienced ******** ***** ****** associate *** ******** ******** of *** ****** **** a ****** ************** ** the ****, *** ** Post *******.

****** ******** *** **** than * ******* ** challenges **** **** **** 'secured' ****. ****** *******, even **** ************ * 'random' ******, ****** *** potential ************ **** **** of ********* ** * few *******, *** ****** combinations (*******/*****/********* *******) *** take ******* ** ****** down.

IPVM Image

**** *******

********, **** ** ******* in *** ******* *****.

******* ** *****, ****** the ****** ******* *** constructed ** ******* **** is **** *** **** time. ** **** ****, guessing *** **** ****** combinations ** ************* ***** by ****** *** ******* most ********** ****:

IPVM Image

**** ** ******/********

* ***** ****** ******** is ******, ********, ** etchings **** **** * valid *** ***** ** plain ****:

IPVM Image

** *******, ***** ****** are ****** ** * matter ** ***********, *** users ******* ******** *** security ***** ** *** PIN ** ***, *** the ***** ** ****** control ** *** ******* can ** ****** ** pointless *** **** ************.

Snooping ****

**** **** ******** ** prior ************ ** *** obvious, ***** *** ** watched ******** ***** *****.

****** * **** ** deliberate ** ********* ***** fingers *** *** ****** while ******** * ***, even * ****** ******** can **** *** ******** the ****. * **** determined ******** *** **** use ****-***** ****** ** even '******' ******* ******* to ***** *** ***** combinations:

IPVM Image

PIN ******* ** ****

**** ** '*******' ***** of ******* * **** are *********, * **** vulnerability ****** ********** ** mitigate *** ***** ******* codes ********. ** *** seem **** ** **** solution *** ** ************ circumstance, *** ******* * unique *** **** **** one ***** ****** ***** that '****** *******' ** lost.

**** ***** *** ******** where ***** *** ******* codes *** ******* ** labels ** ********, ******* to *** **** ** plain *****, *** ******* undermine ****** ********** ****** codes ** ***:

Configuring ******* *** ** ***********

********** *** ****** ** a ********** *** **** prove ***********. *** ************* protocol ****** ** **** readers *** **** *****, Wiegand, *** ********* ********* without ***** ********* ** how ** *********** ****** signals.

** * ******, ************* keypad ****** *** ** fragmented, **** **** *********** requiring *-***, *-***, ** 26-bit ******. *********, *********** include *** *********** *** these ********, *** *** exact ****** ****** **** vary ********* ** ***** Keypad ****** ** ****.

OSDP *******

*** ** *** '************'******* ** ****** **** ****** ******* now *********** ****** ** standardized (*** *********) ***** formats.

*** ******* ** *** v2.1.7 **** ******** ******** this (*.**) ** ***** below:

IPVM Image

Steps ** ******** ****** **********

**** ******* ********* *** active **********, *** ******** risk **** ******* *** be *********. *** ***** include:

***** *** ******** *****

**** **** ****, *****, and **** '*********' ******* like ****. ********** ******* inside ** ****** ********** may ****, *** ********** inspecting *** *******, ******* them ***** **** * mild ******* (******* ******* or *******), *** ********** the ******* *** ****** and **** **** ** a **** *** ** preserving ********.

*******, *** *** ********** effort ******* ** *********** cost *** ********* ****** by ***** ********** ***** like *********** ***** ** biometrics.

********* ****** ****

*** ** *** ******* failures ** ****** ** that *** *********** ***** change. **** ****, *** user's ***** ** ************** to **** *** ****** of ****** *****.

*** **** *** **** authoritative ****** ** ********* loose ******* ** **** is ****** ** ****** them ** * ******* basis. *** ********* ** changes ******* ** *** population ** *****, *** systems **** **** **** 100 ****, ******** *****-****** helps ******* *** ***** in ****'* *****.

*********** **************

******* *** ****** ** beefing ** ****** ******** is ** ******* **** with **** **** *** credential. *** *******, ********* users ** ***** **** credential ***** *** *** combinations *** *** ***** effect ** ******** **** neither ****/****** ***** *** shared ***** *** ** individually ****. ** ******* using ******** *********** ******** in ********-****** ************** ******.

IPVM Image

*******, *** ******* *** adding ********** ******* ********* itself ** ********** **** to ********** ******* ******** and *******/*********** ********* ***********.

Use ******** *******

**** ******* *** **** secure **** ******. * version ****** '******** ****' or '****** ****' ** not ******* ********* ****** in * *********** "*-*,*" orientation, *** *******, ********* the ****** ***** **** they *** ****. *** randomness ********* *** '****** wear' ************* *** ****** distributes **** ***** *** buttons. *** ****** ***** are ***** *****:

IPVM Image

*** ********** ** ***** units *** *** ********** orientation ** ****** **** time * **** ******* in * ****, ****** be ****** ****** ******** in ***** ** *** unit. *******, **** *** very ********* (~$*** - $1200, ******** ** for '***-********' *****) *** not ****** ********* ** the ****** ******.

[****: **** ***** *** originally ******* ** ****, but ************* ******* ** 2020.]

Comments (5)

** *** ******** *************** units **** *** **** relay *********** *** **** strike ** *** *******, unsecured **** ** *** wall ****** ****** **** tethered ****** ** *** secured ****** ****? ** the ******* ***** ******* inside *** **** *** keypad ** ******** *******.

*** *** ***** ******* reader ****** ** ******** one ** ***'* **** new ******** **** **** come ** **** ** years. * *** ******** searching **** *** *** for * **** ******* reader **** ****'* * stand ***** ******.

IPVM Image

** ***** * ****** you ***’* ********* *** buttons ***** **** ** even *** *** ****?

IPVM Image

** **** ***** * film *** ***** **-*****?

** **** ***** ** clunky ***** ? ***** it ** *** *****

****** **** ************ **** from *** ******, ******** is **** **** ******* something **** ****** ****** can ****** *** **** and **** **** ******** way ** **** *** keys ** *** ****** maybe

Login to read this IPVM report.

Recent Reports

Dangerous Hikvision Fever Camera Showcased by Chilean City on Aug 07, 2020
Deploying a fever camera outdoors, in the rain, with no black body, is...
"Grand Slam" For Pelco's PE Firm, A Risk For Motorola on Aug 07, 2020
The word "Pelco" and "grand slam" have not been said together for many years....
FLIR Stock Falls, Admits 'Decelerating' Demand For Temperature Screening on Aug 07, 2020
Is the boom going to bust for temperature screening? FLIR disappointed...
VSaaS Will Hurt Integrators on Aug 06, 2020
VSaaS will hurt integrators, there is no question about that. How much...
Dogs For Coronavirus Screening Examined on Aug 06, 2020
While thermal temperature screening is the surveillance industry's most...
ADT Slides Back, Disappointing Results, Poor Commercial Performance on Aug 06, 2020
While ADT had an incredible start to the week, driven by the Google...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all of the...
SIA Coaches Sellers on NDAA 889B Blacklist Workarounds on Aug 05, 2020
Last month SIA demanded that NDAA 899B "must be delayed". Now that they have...
ADI Returns To Growth, Back To 'Pre-COVID Levels' on Aug 05, 2020
While ADI was hit hard in April, with revenue declining 21%, the company's...
Exposing Fever Tablet Suppliers and 40+ Relabelers on Aug 05, 2020
IPVM has found 40+ USA and EU companies relabeling fever tablets designed,...
Directory of 201 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Dahua Loses Australian Medical Device Approval on Aug 04, 2020
Dahua has cancelled its medical device registration after "discussions" with...
Google Invests in ADT, ADT Stock Soars on Aug 03, 2020
Google has announced a $450 million investment in the Florida-based security...