Keypads For Access Control Tutorial

Author: Brian Rhodes, Published on May 31, 2018

Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if they were unlocked.

However, despite the drawbacks, keypads are still one of the most common choices in access today.

With this note, we examine the weaknesses of keypads including:

  • Revealing Buttons
  • Snooping Eyes
  • PIN Sharing is Easy

Inside we offer advice on how to deploy them securely and examine a type of keypad that overcomes glaring weaknesses.

Operation Described

The function of keypads in access control is dead simple. The door or gate remains locked until the user enters a valid combination string, usually a sequence of numbers. Most access control applications assign each user their own number, called Personal Identification Number (PIN). Unless the user enters a valid combination, the opening remains locked.

Why Keypads?

If these input readers are so terrible, why do people use them? The single biggest 'pro' in using keypads is that no external credential is required. There are no cards or fobs to buy, fingerprints to enroll, and template records to manage. A user is given an access code that is presumably memorized or included in other documents, and nothing else is required.

The lack of external credential results in a lower operating cost relative to 'credential based' systems.

The Problems

Despite being one of the oldest and most used access readers, keypads have huge vulnerabilities. Worse still, it takes no special tools or skills to exploit these problems. While individual units may be better, or even worse, than others at these shortcomings, the biggest problems are:

  • Revealing Buttons
  • Snooping Eyes
  • PIN Sharing is Easy

In the sections below, we examine these issues and address how they undermine even the best access control platform and most secure locks.

****** ******* ******* **** ***** ** **** *** **** ****** systems.** ******** **********, ******* *** ****** ******* ****** ***** ****** as ** **** **** ********.

*******, ******* *** *********, ******* *** ***** *** ** *** most ****** ******* ** ****** *****.

**** **** ****, ** ******* *** ********** ** ******* *********:

  • ********* *******
  • ******** ****
  • *** ******* ** ****

****** ** ***** ****** ** *** ** ****** **** ******** and ******* * **** ** ****** **** ********* ******* **********.

Operation *********

*** ******** ** ******* ** ****** ************* ******. *** **** ** **** ******* ****** ***** *** user ****** * ***** *********** ******, ******* * ******** ** numbers. **** ****** ******* ************ ****** **** **** ***** *** number, ****** ******** ************** ****** (***). ****** *** **** ****** a ***** ***********, *** ******* ******* ******.

Why *******?

** ***** ***** ******* *** ** ********, *** ** ****** use ****? *** ****** ******* '***' ** ***** ************* ** ******** ********** ** ********. ***** *** ** ***** or **** ** ***, ************ ** ******, *** ******** ******* to ******. * **** ** ***** ** ****** **** **** is ********** ********* ** ******** ** ***** *********, *** ******* else ** ********.

*** **** ** ******** ********** ******* ** * ***** ********* cost ******** ** '********** *****' *******.

The ********

******* ***** *** ** *** ****** *** **** **** ****** readers, ******* **** **** ***************. ***** *****, ** ***** ** special ***** ** ****** ** ******* ***** ********. ***** ********** units *** ** ******, ** **** *****, **** ****** ** these ************, *** ******* ******** ***:

  • ********* *******
  • ******** ****
  • *** ******* ** ****

** *** ******** *****, ** ******* ***** ****** *** ******* how **** ********* **** *** **** ****** ******* ******** *** most ****** *****.

[***************]

Revealing *******

****** ******* **** *** ******* **** **** ****. **** ** a **** *******, ******* **** *** ******* ****** ** **** access *** *** **** ********* ******* ***** ** ***. **** the *** ******** *****:

*** **** **** *** ******* **** **** ** **** *** grime **** ****'* *******. ** ***** ******, **** **** ******* show **** ****, *** **** *** **** ************* ******** ***** likely ********* *** ******** ******** ** *** ****** **** * common ************** ** *** ****, *** ** **** *******.

****** ******** *** **** **** * ******* ** ********** **** open **** '*******' ****. ****** *******, **** **** ************ * 'random' ******, ****** *** ********* ************ **** **** ** ********* to * *** *******, *** ****** ************ (*******/*****/********* *******) *** take ******* ** ****** ****.

********, **** ** ******* ** *** ******* ** *** *****. Instead ** *****, ****** *** ****** ******* *** *********** ** stainless *****. ******* *** ***** ******* ** * **** ***** with '*******' *******, *** **** ****** *** ****** ******* *** dull ***** *** ******* **** ***** ******* *** *****. ** this ****, ******** *** **** ****** ************ *** ****** *************.

Snooping ****

**** **** ******** ** ***** ************ ** *** *******, ***** can ** ******* ******** ***** *****.

****** * **** ** ********** ** ********* ***** ******* *** the ****** ***** ******** * ***, **** * ****** ******** can **** *** ******** *** ****. * **** ********** ******** may **** *** **** ***** ****** ** **** '******'******* ********* ***** *** ***** ************:

PIN ******* ** ****

**** ** '*******' ***** ** ******* * **** *** *********, a **** ************* ****** ********** ** ******** *** ***** ******* codes ********. ** *** **** **** ** **** ******** *** an ************ ************, *** ******* * ****** *** **** **** one ***** ****** ***** **** '****** *******' ** ****.

**** ***** *** ******** ***** ***** *** ******* ***** *** written ** ****** ** ********, ******* ** *** **** ** plain *****, *** ******* ********* ****** ********** ****** ***** ** all:

Overcome *** **********

********** ** *** ***************, ******* *** ********* ** ****** ** modern ****** ******* *******. **** ******* ********* *** ****** **********, the ******** **** *** ** *********. *** ***** *******:

***** *** ******** *****

**** **** ****, *****, *** **** '*********' ******* **** ****. Installing******* ****** ** ****** ************* ****, *** ********** ********** *** *******, ******* **** ***** with * **** ******* (******* ******* ** *******), *** ********** the ******* *** ****** *** **** **** ** * **** way ** ********** ********.

*******, *** *** ********** ****** ******* ** * *********** **** not ********* ****** ** ***** ********** ***** **** *********** ***** or **********.

********* ****** ****

*** ** *** ******* ******** ** ****** ** **** *** assignments ***** ******. **** ****, *** ****'* ***** ** ************** to **** *** ****** ****** *****.

*** **** *** **** ************* ****** ** ********* ***** ******* of **** *** ****** ** ****** **** ** * ******* basis. *** ********* ** ******* ******* ** *** ********** ** users, *** ******* **** **** **** *** ****, ******** ***** yearly ***** ********* *** ***** ** ****'* *****.

*********** **************

******* *** ****** ** ******* ** ****** ******** ** ** combine **** **** **** **** *** **********. *** *******, ********* users ***** **** ********** ***** *** *** ************ *** *** added ****** ** ******** **** ******* ****/****** ***** ** ****** codes *** ** ************ ****. ** ******* ***** ******** *********** together **:*****-****** ************** ******.

*******, *** ******* *** ****** ******** ******* ********* ****** ** additional **** ** ********** ******* ******** *** *******/*********** ********* ***********.

Scramble *******

**** ******* *** **** ****** **** ******. * ******* ****** 'scramble ****' ** '****** ****' ** *** ******* ********* ****** in * *********** "*-*,*" ***********, *** ******* ********* *** ****** every **** **** *** ****. *** ********** ********* *** '****** wear' *************, *** ****** *********** **** ***** *** *******. *** common ***** *** ***** *****:

********** ** ***** ***** *** *** ********** *********** ** ****** each **** * **** ******* ** * ****, ****** ** viewed ****** ******** ** ***** ** *** ****. *******, **** are **** ********* (~$*** - $****, ******** ** 'non ********' *****) *** *** ****** ********* ** *** *** system.

[****: **** ***** *** ********** ******* ** ****, *** ************* updated ** ****.]

Comments (21)

Many keypads on public areas (gated communities, certain buildings) that might require emergency responder access often have a code like "0911" or "9110", which further reduces their overall security.

Hey Brian,

Another good article thanks. Quick comment...not sure about labeling this method of access worst or best or anything else. It can be a very feasible security option in many applications...when considering specific criteria and customer needs. It is one factor authentication and certainly has limitations as you properly point out.

Last comment....many keypads (even inexpensive stand alone types) have non-volatile memory for multi codes/users. So if used effectively will mitigate or eliminate the issue of revealing keys using just one code. Still codes need to be changed for everyone time to time as you suggest.

Thanks.

Thanks for the feedback, Marc.

This didn't make the official "don't" list, but you should not write the valid code and tape it up near the keypad, either:

I definitely agree of course, but have worked at one place (a nursing home) where the code to get out of a secure building is noted above the keypad - dementia sufferers have no idea or quickly forget what the numbers are about so they can't easily "escape"/ wander off, but everyone else is easily and safely able to exit at any time. It wasn't my idea but seemed to work OK in that particular site.

We had these at a facility I used to work at. The scramble pads are pretty neat, especially in a card+PIN configuration.

We have from time to time received the access card from a departed employee and found it to have the code for turning off the BA system written on it! I imagine this might happen with PIN codes, too. Silly people...

And the release of the FLIR One attachment for the iPhone just made it that much less secure:

Good advice. But please don't share with my wife. Making sure the gas knobs on the stove are off stresses her out enough.

Tell her to use her nails when punching in pin codes. No need to explain further :)

nice video... very interesting uses...

Found all information very interesting. Never realized there was so much to consider when thinking about readers and key pads.

Low tech

I agree with this article big time. This has to be the most easily manipulated access entry device. Great examples above.

Most access control keypad use is standalone. However if you do integrate it with a full scale system you need to be aware of what format your system wants from the keypad. If you get a keypad that spits out wiegand then your system may think it's a card reader instead. You might need to you 8 bit output or possible something else. Make sure you ask both manufactures before you order and waste time troubleshooting.

Full Disclosure: I represent ProDataKey but in my sincere opinion, this is one heck of a Keypad both in functionality and aesthetics!

ProDataKey Keypad

It looks good, but that is a 125 kHz (I'd guess 26 bit) clamshell card, isn't it?

Does that keypad RFID reader work with 13.56 MHz formats?

Correct 125 kHz only.

I'd guess 26 bit

Based on this?

Yes 26 Bit. HID compatible.

Great article.

In the last 2 years we've begun received customer requests (a few) for scramble pads for use in healthcare areas such as memory support, team and medicine rooms. In most cases once the project bids the security system is often value engineered and made less secure to get the project back in the black.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Startup SafePass Profile on Oct 19, 2018
A major problem with visitor management is that the systems mostly require adhesive printed paper labels and paper logs, creating waste and an...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...
Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
UTC Merges Lenel and S2, Creates LenelS2 on Oct 03, 2018
UTC has completed the acquisition of S2, launching literally Lenel's2 LenelS2 with UTC declaring that "LenelS2 unites two world-class teams with...
Anti-Tailgating Startup: Spyfloor on Oct 03, 2018
A Canadian startup, Spyfloor, is using a different approach to warn against tailgating, a common access control problem. By counting feet,...
VMS Mobile App Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Oct 01, 2018
Mobile VMS apps are a critical interface for the modern surveillance user. But who does it best and worst? We tested 6 manufacturers - Avigilon,...
Favorite Power Supply Manufacturer 2018 on Sep 28, 2018
While power supplies are becoming less important as PoE matures, they remain vital to access control systems, where increased power for locks,...
AHJ / Authority Having Jurisdiction Tutorial on Sep 27, 2018
One of the most powerful yet often underappreciated characters in all of physical security is the Authority Having Jurisdiction (AHJ). Often,...
Access Control Lock Guide on Sep 26, 2018
In this guide, we examine locks; critical elements of any security system and fundamental parts of every access control system. Two fundamental...

Most Recent Industry Reports

Startup SafePass Profile on Oct 19, 2018
A major problem with visitor management is that the systems mostly require adhesive printed paper labels and paper logs, creating waste and an...
China Is Not A Security Megatrend, Says SIA on Oct 19, 2018
The US Security Industry Association has released its 10 "Security Megatrends" for 2019. SIA declares that these megatrends, such as "Advanced...
Hanwha Dual Imager Dome Camera Tested (PNM-7000VD) on Oct 18, 2018
Hanwha has introduced their first dual-imager model, the PNM-7000VD, a twin 1080p model featuring independently positionable sensors and a snap-in...
Camera Height / Blind Spot Added to IPVM Camera Calculator on Oct 18, 2018
IPVM has added camera height and blind spot estimation to the Camera Calculator. This is especially helpful for those who need to mount cameras up...
Axis Strong US Growth, Flat EMEA - Q3 2018 Financials on Oct 18, 2018
This spring, Axis had its best financials in many years (see Axis Strong Q2 2018 Results). However, over the summer, Axis had many products sold...
Best Alternatives to Banned Dahua and Hikvision on Oct 17, 2018
With the US government ban and a growing number of users banning Dahua and Hikvision, one key question is what to use for low cost? While Dahua and...
Video Quality / Compression Tutorial on Oct 17, 2018
While CODECs, like H.264, H.265, and MJPEG, get a lot of attention, a camera's 'quality' or compression setting has a big impact on overall...
Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact