by Katie Daniel | November 29, 2016 9:40 am
By Scott Lindley
Electronic access control systems offer several advantages over traditional locks and keys. Badges, tokens, or cards limit access to a facility to only individuals with these devices. For example, companies can restrict employees access to certain areas, or program security systems to limit access to only specific times (i.e. few hours before and after a scheduled event for vendors or delivery people).
Often, when one starts exploring the world of keyless access, a new series of terms arise—passive cards, active cards, proximity cards, smart cards, long-range readers, and Wiegand. This article provides an overview of these access control technologies and how they fit into a building’s security systems.
Passive and active cards
Passive and active readers are the two older technologies. Powered by radio frequency (RF), signals from a passive card reader have a limited range of 101 mm (4 in.) and must be held close to the user. It does not have its own battery. The larger the RF, the longer it will read in distance. Devices mounted on walls are typically rectangular or square, while other readers are designed to fit on a mullion, door, or screen. The passive card and reader communicate with each other by an RF process called resonant energy coupling.
Passive cards have three internal components—antenna, capacitor, and integrated circuit—to store the user’s ID number and other data. The reader also has an antenna generating a short-range RF field in a spherical orbit. When the card is placed within range of the reader, the card’s antenna and capacitor absorb and store energy from the field and resonate. This powers the integrated circuit, which sends the ID number to the card’s antenna, transmitted by RF signals back to the reader.
Powered by an internal lithium battery, some devices can produce a much longer read range than passive card technologies. An active card reader’s integrated circuit contains a receiver and transmitter using the battery’s power to amplify the signal so active cards can be detected from long distances. However, the longer read ranges and spherical orbit can create problems, such as when several card readers and reads end up conversing with each other, creating a sort of communication ‘mayhem.’ Users should pick a card that works best with the application and with the right type of reader.
Proximity cards
Proximity cards and Wiegand standards constitute the majority of card-based keyless access. With these 125-KHz devices, there is no contact between cards and the reader, eliminating the wear-and-tear. Further, the reader is often durable or hidden into the wall so it cannot be vandalized. In some cases, the device may even withstand a ballistic attack.
The card readers communicate to the rest of the access control systems in various protocols, such as Wiegand—a wiring standard that arose in the 1980s. Another popular protocol is a standard magnetic stripe card interface. When selecting a proximity card and reader, there are factors to keep in mind. It needs to comply with its interface protocols so cards and readers will work with a wide range of electronic access control systems. It is important to check to see if the reader electronics are secured with tamper- and weather-resistant epoxy potting, in the event the device is used outdoors or in wet or dusty environments. The electronics should have a lifetime warranty. Business-owners may also want a multi-factor verification system in addition to a card to activate the door lock (e.g. card keypad reader).
Smart cards
Contactless smart cards are expected to surpass proximity cards in the next few years. These 13.56-MHz smart card systems are securer and used for applications beyond access control (e.g. tool checkouts, or purchases at a company cafeteria). They conform to International Organization for Standardization (ISO) standards. The identification cards operate within 101 mm (4 in.), ensuring a positive read and comfort for the user. However, it is important to note proprietary, non-standard-based smart card technologies could bind a user to a single-supplier dependency and potentially restrictive pricing and delivery structures.
In addition, the Open Supervised Device Protocol (OSDP) helps ensure numerous manufacturers’ products will work with each other. Interoperability can be achieved regardless of system architecture. The specification handles smart cards, constantly monitoring wiring to protect against attacks and serves as a solution for high-end encryption as required in federal applications. The specification for handling light-emitting diodes (LEDs), text, buzzers and other feedback mechanisms provides a rich, user-centric access control environment.
Smart card readers have many of the same features found in proximity card readers—potted, different sizes, and card plus keypad.
Transmitters and receivers
These 433-MHz receivers support either two-button or four-button transmitters from ranges up to 60 m (200 ft). Each button outputs transmitter data, the user’s ID number, and other data over separate Wiegand outputs.
The receiver installs just like a standard proximity reader for easy integration with popular access control systems
(e.g. gates and vehicle barriers, moving aircraft in and out of secure hangars, arming and disarming alarm systems, as well as situations calling for emergency duress). Instead of using a card, which could activate more than one device or door at a time, the transmitter holder selects the mechanism to be triggered.
Contactless cards and fobs
Proximity manufacturers provide one of three types of cards: standard with light, image technology, and multi-tech. The standard light proximity card is a clamshell design, two connected sides sealed together to hold the electronics. An image technology card is a thicker card, appropriate for dye-sublimation printing. There are two main types of proximity smart cards: clamshell contactless and ISO contactless—both of which are compliant with ISO 14443, Identification cards−Contactless Integrated Circuit Cards: Proximity Cards. They have 1K-byte memory, but more memory can be added. Manufactured from glossy polyvinyl chloride (PVC), these cards are appropriate for dye-sublimation imaging.
Key fobs are available in both proximity and smart card technologies; they are used in place of cards and designed to be carried on a keyring. Most durable fobs include a brass-reinforcing eyelet.
Preventing hacking and duping of card systems
People have figured out how to capture and use card-based information to fool the system and let their ‘colleagues’ in, using skimming, eavesdropping, and relay attacks. Despite its prevails, Wiegand is no longer secure due to its original obscure and non-standard nature. Identification harvesting has become a lucrative hacking activity; a credential’s identifier is cloned, or captured, and retransmitted via a small electronic device.
Some card and card reader manufacturers offer security options, such as providing a higher-security interaction, or code, between the card or tag and reader to ensure readers will only accept information from specially coded credentials. The integrator will never provide another organization with the same code. No other organization will have an identical reader/card combination.
Tamper-resistance features are available to be used with contactless smart card readers, cards, and tags and can add an additional layer of authentication assurance to smart card platforms. This protection allows the reader to verify sensitive access control data programmed if the card or tag is not counterfeit. Manufacturers program readers, cards, and tags to detect fraudulent data. If tampering is detected, the reader reports it promptly to the access controller, identifying the credential in question.
Vandal-proofing card readers
Vandal-resistant and bullet-resistant contactless card readers are ideal for installations when more durability is required. They are becoming popular at K–12 schools, universities, correctional institutions, housing authorities, factories, and hospitals.
With both types of hazard-resistant readers, protection is greatly enhanced because electronics are sealed in weather-and tamper-resistant epoxy potting for both indoor and outdoor operations, providing an IP67 rating, which assures the electronics are protected from water, steam, detergents, dust, sand, tools, and other elements that could be used to impede data collection.
Vandal-resistant readers can be manufactured from thick polycarbonate material and feature tamperproof screws. A tamper-resistance mode is also available, providing supervision of both reader and cabling. Bullet-resistant proximity card readers can provide the highest level of vandal-resistance by featuring a virtually indestructible exterior. Readers are milled from a solid block of stainless steel and reinforced with a bullet-resistant insert compliant with UL 752, Standard for Bullet-Resisting Equipment, performance level standards of ballistic protection.
Lowering energy costs
Often, vendors provide devices with a technology that cuts energy costs and is an easy addition to any company’s green initiative. In emergency power situations, proximity readers using the low-energy option can reduce average current draw by as much as 50 per cent, providing significantly longer up-times with their backup batteries.
Scott Lindley is a 25-year veteran of the contactless card access control provider industry. Since 2003, he has been the president of Farpointe Data, a Dorma Group company, which works with Radio-frequency identification (RFID) systems, including proximity, smart and long-range solutions, for access control professionals around the world. He can be reached via e-mail at scottl@farpointedata.com[1].
Source URL: https://www.constructioncanada.net/contactless-cards-and-readers-what-design-professionals-need-to-know/
Copyright ©2025 Construction Canada unless otherwise noted.