When installing card readers: build a pathway to future card-based technologies

Access & Identity Management Handbook 2005 Access Control & Identity Management

The 125 KHz proximity and Wiegand standards currently constitute the majority of the card-based access control market worldwide. The reluctance among these card issuers to move towards the more advanced smartcard technologies is primarily due to their extensive investments in legacy proximity/RFID/contactless technology. What has been needed is a reader that bridges the gap between the old and the wanted. Transition readers address this large segment of the market and should be considered when planning any type of new or refurbished access control system.

In a new world of standards, this is especially important. Compliance with multiple standards is needed in emerging applications that are being created by the recent homeland security and HIPAA (Health Insurance Portability and Accountability Act) legislations. They necessitate standards-based physical access control measures at a multitude of venues.

The architecture of transition card readers supports today's new physical access control initiative to establish flexible, scalable, non-proprietary platforms that let organisations maintain their current user bases and upgrade their access control systems to meet new security requirements within their own timelines and budget. With multitechnology transition card readers, companies can continue using their existing proximity cards and easily migrate to more secure access control using smartcards when the opportunity arises.

Other considerations for multitechnology cards

If a perimeter or card system is breached, it is really not enough to simply notify the control room. In many cases, there is no one monitoring the facility after hours. Even if monitored remotely, by the time someone can respond, the intruder has come and gone.

Therefore, it is important that multitechnology readers also provide 'intelligent supervision' that monitors the communication between the access control panel and the reader at the door. For instance, intelligent four-state supervision continuously monitors for a cut line, short circuit, closed circuit, and open circuit conditions at door contacts and request to exit (REX) connections. Tri-state LEDs and audible alerts will indicate status, alarm and perimeter-tampering conditions. An internal tamper switch will automatically alert security personnel if the reader is violated. This supervision ensures that security personnel are immediately notified if someone tampers with the reader, a door is breached or a circuit is bypassed, either by cutting or shorting. But, as stated earlier, this is not enough.

Upon an alert, you need the reader to be removed from the system. When breached, the reader needs to become inactive, removing the opportunity for the intruder to enter through this access point.

Make it easy on the user

There are really two goals for an access control system. One is to keep unauthorised people out. The other is to let authorised people in. When the latter is compromised, all too many systems, though installed, are not employed.

Therefore, to assure the system gets used, make sure that the card readers selected also offer expanded hassle-free contactless convenience when entering and exiting secure facilities. There is now a special optimisation technology that automatically adjusts to a wide range of installation environments to provide consistent read range performance no matter where or on what the reader is mounted. It automatically detects and optimises the credential read field, even in challenging environments with metal surfaces. By optimising the card readers to any metallic or non-metallic environment, cardholders experience consistent reader performance, regardless of location or environment.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...