Selecting Access Control Readers Tutorial

By: Brian Rhodes, Published on Nov 09, 2017

Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will help you arrive at the right product no matter which system you are using.

These factors are:

  • The Basic Reader Types: Contacless, Barcodes, Keypads, and Biometrics
  • Quick Overview Of Contactless Frequencies and Formats
  • How Mounting Surfaces Impact Selection
  • Why Establishing Contactless Read Range Is Crucial
  • Awareness Of Infrastructure Requirements Like Power and Connectivity
  • Protocol Support (Wiegand vs. OSDP)

In this note, we address these attributes, explain how they are different, and help users understand which reader is the ideal choice for their application.

[Note: This tutorial was originally published in 2014 and substantially revised in 2017]

***** *** ******* ** types *********, ********** ****** control ******* *** ** a ******** *******. *******, focusing ** * *** key ******** **** **** you ****** ** *** right ******* ** ****** which ****** *** *** using.

***** ******* ***:

  • *** ***** ****** *****: Contacless, ********, *******, *** Biometrics
  • ***** ******** ** *********** Frequencies *** *******
  • *** ******** ******** ****** Selection
  • *** ************ *********** **** Range ** *******
  • ********* ** ************** ************ Like ***** *** ************
  • ******** ******* (******* **. OSDP)

** **** ****, ** address ***** **********, ******* how **** *** *********, and **** ***** ********** which ****** ** *** ideal ****** *** ***** application.

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

[***************]

Credential ****

*** ***** ********* **** defines **** ******* *** which *********** **** *** designed ** ****.

*** ******** ****** ******* applications, *** ********** **** has ******* **** *********** and ** ***. ******* in ****-**** ******* *** use ***-******** ********** ***** and *** ******* ******** readers **** *** ******** manufacturer, ******** *********** ******* as * ******.

*******, ****** ******* *** equipped ** **** ******* credential *****, ** ****** an ******** ********* ** the ******* ******* ** use ** * ******** step.

*********** ***** ****** ** picture ***, *** ********** take *** **** ** cards *** *** **** several ***** - *** our****** ********** **** ****** Tutorial*** **** *******. *** following **** ******* *** major ***** ** *********** used ** ****** ****** control *******:

  • *** *********, *** *** Standard *********: *** **** common ********** ***** ** use ******* *** ****** to **** *** ********** near *** ******, *** not **** ******* **** it. ***** *********** *** be **** ******* *******, pockets, *** ***** - and **** *** ******** used ** ** *****, keyfobs, *** ********** ********.
  • **** *********, **.** *** Smartcard: *** ****** **** of **** ******** ** onboard ******* **** (***) that ****** ****** **********, more *******, *** **** rewriting ************. ********** ***** this ******** ********** ***** use *** **** *** multiple *******, ********* ******* access *** ******* *****.
  • *******/*********: ***** ******* ******** obsolete ** *** **** of ********* **** ****-***, older ****** ******* *** still *** ***** ***********. While ********** ** ******* and *********** ** *****, magstripe/barcode ***** *********** **** the ******** ** ***** options *** *** ** copied ** ******* ******. In ********, *** ********** of ***** *********** ** not **** ****** *** commercial ***, ** **** mild ********** ** ******** scratches *** ****** ***********.
  • **********: ***** ************* ******** belonging **** ** ******** users ** **** *******. Fingerprints, *********, ****/*******, *** face *********** ******* *** commonly **** ** *******.
  • ******** **********: ***** ***** of ********** ***** *** or **** ** *** listed ***** ** * single **********. ***** **** expensive, ***** ***** *** the **** ******** ***** they *** ** **** with ******* ********* ******* and *** ** *********** from *** ********.

Credential ********* *********

*** *********** ***********, * type ** ** ********** called '******** ****** ********' is **** ** ******** card ***********.

** ***** *****, *** principal ********* ** ****** 125 *** *** **.** MHz *********** **** ******* is *** *** ****** to ******* *** **** embedded ** *** ****/ delivers ***** ********** ** the ****, ***** **** momentarily ****** ****** *** then **** ** ** broadcast **** ******* **** to *** ******. *** image ***** ***** * transparent ******* ** * card, ********* *** ***** components:

* **** **** *** 125 *** *********** ** how **** *** ***** it ** ** **** card ******* ******* ********* of *** ******. ***** formats *** *** ******* or ********* *** *** be ****** ** ******* with ****** ******.

*** ****** **** ** copy *** ***** ***** much *** **** *** as ****** **** *******. Our **** ***** ***** from**** **** ****** ******* With **** $** *** 125kHz **** *********** *** ***$** ********* ** **** ** seconds ** ***** *** 125kHz ********* ****** *****:

13.56 *** ****** ***********

*** *** **** **.** MHz ****** ******* ***** come **** *** ********* vendors:

** *******, *** ****** iClass ** **** ********* on * ***-****** *** per-credential ***** ******** ** MIFARE/DESFIRE. *** ****** ** the **** ********** ** largely *** ** *********, as *** *** ******* is ********, ** *** manufactured ********, ** *** or ***** ****** **** Abloy. ** ********, *** non-HID ******* *** '**** use' *** *********** **** for *** ************ ** build ******* ******* **** with ** ********* ****.

*** ****** ******* ********** between ****** ****** ******* varies ***** ** ********** part *******, *** *** cost ********** ********* ****** 10% - **% **** for *** *** ********. However, ********** ** ***** America, *******, *******/******* *******, and ******* ************ *** be ****** *** *** who ******* *********** ****** share ** **** ******. Elsewhere ** *** *****, NXP-based ******* *** ** more *******, *** *******/******* may ** **** *********.

*** ******** ******** ******* the *** *******, *** our:*** ** *** ***************.

Multifactor ********** *******

** ******* ****** **** than *** ********** **** to ******** *****, **** are ***** ** '*********** readers'.

***** ***** *** ***** required *** **** ******** applications ** ** ***** users ********** ***********. *** example, * ****** *********** unit ******** * ********* card ****** **** * keypad, ** ** * user ******* ** ********* a **** **** *** still **** ** *** a **** *** *****. Combination '***********' ***** ***** combine **** *********** **** biometrics **** ************, *******, or **** ******.

** * ***** **** entry ****** ******** ********* cards, *********** *****, ** a ****** **** ** order ** ** '***********', two ** **** *********** would ** ******* *** entry, *** **** ********* credential ****** *** ********** for *** **** ** present ** *** ****. The ***** ***** ***** an ******* ** * typical '***** ******' ****** device:

**** ********** '*******' **** additional ********** ********, ********* biometric ********* **** ***** are ************* ********** **** the ****** ******* ******. The ***** **** *********** readers ******* ********** ********** factors ***** ******* ** affected ** *** ***** number ** ******* **** must ** ********, *** the ****** ** ********** a ********** **** **** to ** *********.

***** **** *** ******* integrate ******* **** ***** keypad **** *******, ************* with ********* ******* ** high ******** ********** (**:****** ******** ***********) ** ******* ** individual ****** ******* *******.

Mounting *******

*********** *** ******** ******** location *** *** ****** is *** **** **** - ***** **** ******* are '************', **** ******** types (********** ********* ***** units) *** *** ****** for ***** ********. ** the ********* *******, ** address *** **** ****** mounting *********, *** ******** the ********* *** ******* the ******* *******:

********/*******:**** **** ********** *******, the ***** ******** *** mounting ******** **** ** sealed ******* ******** *** protected ******* ********. ******* are ******** ********* ** 'potted' *********, ***** *** internal ********** ********** *** sealed ** ***** ** prevent ******* **** ********. Confirming * ****** ** suitable *** ******* *** is ********** ***** ** 'potted' ** **********, ***** departs **** ******** ******** IP *******. ***********, *** actual ********** ** *** reader *** *** ****** between ******/********* *********.

**** *****: *** **** ***** orientation *** ******** ******* is ** *** **** nearby *** ********** *******. While ******* ******* *** be ******** ** ***** directly ** ******* ** masonry **** ****** ******, heavier ******* *** ******* additional ********. ****** ********* can ** ******** ****** through ***** ***** ** walls, ** ********* *** be ********** ** ******-**** junction ***** - ** this ****, *** ****** is ********** ******* ******** onto * ******** *** cover *****.

******* *****:***** ***** ** ******** to ********, ** ***** control ******* ****** ** fished ******* **** ************, a ****** ******** ** mounting ******* **** ****** door ******. ******* *** mounting ******* ** ********* metallic, ********** ******* *** shielded ******* *** ** required. ***** ******* *** identifiable ** ***** **** profile, ***** **** * few ****** ****. **** through ***** ******* *** narrower **** ******* ****-***** types, **** *** ********* in *** **** ****-****** and ***** *** **** multi-factor (**: **********, ******) options.

******* *****: ******* **** *** gate/parking *** ************ *** frequently ******* ** ***** or ******** ***** ********. These ******* ********* **** longer **** ****** **** door ******* *****, ***** the ********** *** ** feet **** ****** ** automobile ** ********** *******. While ***** ******* *** typically ********* ** ****** controllers *** **** ** other *******, **** *** require ***** ***** ******** and ***** *********/*********. ***** type ** ******* *** also ******* *** *** of ***** ********** ** other ******** ******* ** increase ***** ************* ******** to ***********.

********* *****:*** ** *** **** challenging ******** ********* *** a ****** ** ** a ********* - *** only *** ***** ***** typically ********, **** *** frequently ******* ** ******* shock, ** ********, *** impact *****. ******** ******* readers *** ******* ******** replacement. ** * ******, ruggedized / ****** ********* readers *** *********** *** turnstile ************.

Read *****

*********** *** ******** * card ****** ** ****** to ****** * ********** is *** **** ****. Understanding *** ***** ******* the ****** *** *** controlled ******* ** ******** - *** **** **** it **** **** ** physically ****** **** * reader ** **** * door (********** **** ********** accessible ********), *** ******** distance ******* * **** reader *** ** ********** may ******* ******* *************.

********** ******* *** ********* available ** ***** ******* defined *********. **** ************ defines *** ***** ******** differently, *** *** ***** is ********* ********** ** mounting ***********, ************ *******, and **** ** *****. The ******** ********** ***:

  • *****:***** ***** **** ******** between ***** ******* *** 6" - *", *** are ***** ******* *********** adjacent ** ***** ** mullions ** *****. ***** for ***** ******* *** be ********* ***** ******** from *** ********** ******* extra ***** ********.
  • ******: ******* ** *** class ********* ***** ******* close ******* *** **" - **", *** *** suited *** *** ** parking **** *** ** bollards ** ***** ******** to *****. ***** ***** feature ********* ******* **** configurations, ******* **** ***** than ***** ***** *******, and ********* **** ****.
  • ****: ***** ******* ** this ***** ********* **** between * **** *** up ** ** ****. Because ** *** ******* distance, ******* ** **** category **** ** ******* with *** **** ************** as ******** ********** *********: physical **** ** ***** must ** **********, ******** wireless ******* *** ** sources ** ************, *** reader *********** ** ******** for ********** *********.

******* **** ***** ****** also ** ************* *********, with *** ***** ********* 125kHz ****** ******** ****** distances. ***** *** ******* range ** *** * typical ****** *** **** mount ** ******* ***** applications ***** ***** **** less **** * ****** away **** *** ******, using **** ********* **.***** formats ****** **** ** ranges ****** *** ******* garage ** ******* **** applications.

*** *******, ******* *** **** ***** readers***** ** ** **" with ******** *** ******* credentials, *** *******.** *** **************** ***** **" *** have ********* *** ** sell ********** *** **************** *** ****** ****** instead *** **** ***********.

** ** ********* ** note **** *** *** credential ***** **** *** range ********** *********. **** common ********** ***** *** not **** *** ********* of '**** *****' ******* available, *** ********** ******* commonly **** ** ****** may *** ** ******** for **** *** ** the **, *** **** versa.

Required **************

*** ***** ****** ** consider ** **** ******* or ********* ********* *** required ** *** *******. Reader ************** ******* ** consider *******:

  • *****: **** ******* *** designed ** ******* ** 12VDC/24VDC *** **** ***, but ********** *** **** range ***** *** ******* different *********. ** *******, readers *** *** ******* draw *******, ********* ******* only *********. **** ***** of '***** *****' ******* operate **** ******* ***** and ******* ** ******* power **********.
  • ****: **** ******* *** connected ** *********** **** UTP ** **/* *****, but ********** ****** ***** may ******* *** ******* wire ****** ** ******* features **** ***** ****** or *********. ******** ********, typically ***** * ***** to **** ***** *********** system, *** ********** ******* in ***-**** *** ***-**** security ************. **********, **** cabling ** ******** ** shielded ** ******* ************ from ********** **** ******** between ****** *** ********** units.
  • ********* ***** ** ********: ***** *** * traditional ************** *********, ** often ********** ******* ** a ****** ****** ** securing *** *******. ******* most ****** ***** ******* have * ****** ******* life, *** **** ******** lock ********** ****** **** backup ***** (**: ********), a ********** **** *** key **** ** *********. Managing *** *********** **** hardware ** *** *********, but *** **** ********** use ** ***** ***** require * **** ********* and ********** ******* ******.
  • *********/*******:*******, ***** *** *********, secondary ******* **** ********* and ***** ************ ******* can **** ******** ***** requesting ********** ** ***** without ****** ***********. **********, a ********** ****** ******* or ***** * ********** and **** *** ******* this **** ***** ******** at *** ********** *******. Having ** ******** ********* allows ******** ***** ** communicate **** * ******* lacking ***********, ******* ************ area ******** ** ********** access ** ****** *****.

Protocol ******* (******* **. ****)

* ******'* ****** ****** must ** ********** **** the **********. **** ******* must ******* ******* ** OSDP, ** ****** ****** interface ************* *** ****** operations. ******* *** **** useful **** ********** **** the ****** ****** ******, specifically *** **** **********.

*** **** ***** *** standard ************* ************* ******** between ******* *** ********** has ***********, ** ********* **** predates ****** ****** ** TCP/IP *************. ***** *** early ****'* ******* *** use ** *********** ****** outputs ** * *** that *********** ***** *********, regardless ** ************.

*******, ******* *** **** weaknesses **** *** **** amplified ** *** ****** era. **** ** **********, unidirectional ************, *** *** physical *********** ** *********** data **** **** **** far ******** ** ****** credential *** ****** ****** design. ** * ******, a *** ******** ******** called **** ** ***** promoted ** ******* ****** companies.

********** ** ******** *** ****** ********* details, *** *** ******* advantage ** **** ** better ****** *************, ****** monitoring, *** **** ******** than *** *** ******* protocol. ** *** ******* time, ******** ** ******* is ********** *** ******, with **** **** **. However, **** ** ********, with **** ************* ******** new ******* ********** *** protocol *** ***** ** expand ** ** ***** ahead.

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (8)

Good article!!

Here are a few links that are active and might be helpful:

http://www.barantec.com/reader-only/

http://farpointedata.com/products/rugged-readers.php

http://www.stanleypac.com/Products/Readers.htm

Additionally, this is a company that offers readers and associated specifically designed for use in hazardous areas, such as those found in the oil, gas, energy and petro-chemical industries:

http://s3-id.com/esecurity.html.

Brian,

Do you plan to provide an overview of Bluetooth readers, since they started to emerge couple of years ago?

Also, barcode readers maybe getting obsolete as a mainstream technology for secure employee/contractor cards, but I see it having a renaissance for visitor and low security area passes. Any thoughts on that?

Both examples capitalize using a mobile phone for storing and managing access credentials.

On the biometrics side, there is new trend to use facial recognition for access control. Any thoughts/insights on that from you or other members?

Hello Maxim: Great first comment, thanks.

We are releasing an updated 'mobile credentials' overview coming up.

We released Mobile Credentials (BLE / NFC / Apps) Guide to address the space, but there have been a number of modular-style and new BLE compatible readers to include.

And you mention barcodes - I agree there are still relevant applications and they are not going away anytime soon. There has been a recent focus on QR Codes for access, we did a post on one example: Axis: Use QR Codes Instead of Access Cards.

Face Rec is an interesting trend for biometrics, but most feedback to us is that there's a hard justification for it compared over fingerprints/fingerviens or iris/retina scanners. Do you have pragmatic experience with FR for access to share

Thanks, Brian! The article on BLE readers is great and I am going to post comments there, as I've been looking at that space for some time.

For the facial recognition, they are currently being used with turn styles:
https://www.youtube.com/watch?v=79fqBpdAU5g

https://www.youtube.com/watch?v=N26Ve91VSZY

https://www.youtube.com/watch?v=s_RY58IVbXQ

https://www.youtube.com/watch?v=v7TQPSdRlpE

https://www.youtube.com/watch?v=82XJkKiBoB0

Singapore airport in the last video is the best practical example of the facial recognition used for multiple applications.

For many years the standard inter-operable communication protocol between readers and controller has been

For many years the standard interoperable communication protocol between readers and controller has been Wiegand,

Hi Brian,

Great article! Thank you!

There is a little issue in Wiegand vs. OSDP just fyi.

Thanks for catching that! Fixed.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...
10 Facial Recognition Providers Review (Secutech) on May 09, 2019
Adding to our 19 Facial Recognition Providers Profiled report from ISC West, IPVM focused on facial recognition technology for our Day 2 coverage...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...

Most Recent Industry Reports

NJ Law Requires Apprenticeship For Public Works Integrators on May 24, 2019
Few integrators do a formal apprenticeship program. However, now a NJ law is requiring any integrator on public works projects (such as state...
Security / Privacy Journalist Sam Pfeifle Interview on May 24, 2019
Sam Pfeifle is best known as the outspoken former Editor of Security Systems News. After that, he was publications director at the International...
Verkada Video Quality Problems Tested on May 23, 2019
Verkada suffers from numerous video quality problems, not found in commercial IP cameras, new IPVM testing of Verkada vs Axis and Hikvision...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
ASCMA / Monitronics Declares Chapter 11 Bankruptcy Plan on May 22, 2019
Monitronics is entering into Chapter 11 bankruptcy. The company, also called Ascent Capital Group Inc., aka ASCMA, aka Brinks Home Security,...
US Considers Sanctions Against Hikvision and Dahua on May 22, 2019
The US government is considering blacklisting "up to 5" PRC surveillance firms, including Hikvision and Dahua, Bloomberg reported, with human...
Dahua USA Celebrates 5 Years of Errors on May 21, 2019
Dahua USA is, in their own words, 'celebrating' 5 years in North America or as trade magazine SSN declared: Dahua Technology finds success in...
Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
Covert Facial Recognition Using Axis and Amazon By NYTimes on May 20, 2019
What if you took a 33MP Axis camera covering one of the busiest parks in the US and ran Amazon Facial Recognition against it? That is what the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact