Evolving Card Access Options

March 2, 2018
Your grasp of this rapidly evolving technology helps you stay ahead of the curve and keep your customers safe

Electronic Access Control has undergone dramatic change since its early adoption in the mid 1970s. The good news is that you can benefit from this change. This article deals with the underlying technologies available from your existing suppliers.

Access Control systems consist of doors, gates or portals, usually operated by mechanical, pneumatic, hydraulic or electromechanical hardware. The process is controlled by credential, knowledge, or some unique biological characteristic. Your knowledge ghelps you stay ahead of the curve and keep your customers safe.

Credential based systems use keys, cards, tokens, or transmitters. This segment has seen rapid development in recent years. Knowledge based systems use something known like a password or PIN number. Biometrics currently include voice, hand or finger print, retina or iris scan, signature dynamics, facial recognition, hand geometry, keystroke dynamics and blood vessel patterns. Recent biometric developments allow some fingerprint and facial recognition systems to rapidly make reliable sub-dermal measurements below the skin’s surface. (Read Biometric Access Control: Ready for Prime Time in our February 2018 issue, www.locksmithledger.com/12389346.)

Early electronic access control was dominated by Continental Instruments Cypher Lock with two-position rocker switches. This was extremely popular in military and Department of Defense applications since the fingers were concealed during operation.

The Hirsch Scramblepad® eventually became the high security standard. The lighted LEDs were displayed in different positions each time accessed, and could only be viewed from directly ahead, making over-shoulder viewing nearly impossible. Later versions added the HID proximity card, allowing dual validation.

The Magnetic stripe was first applied to a card for access control tests by IBM in 1960. The card was simple, thin, cheap and quickly encoded. Adding an employee name and photo increased the card’s utility for EAC applications.   Later the 3-track card was introduced to allow more data, and high-coercivity stripes with a more robust magnetic field became the standard. Major drawbacks were magnetic stripe degradation from abrasive dirt and sand, limited data storage ability, and ease of duplication.

The Proximity Card was first brought to the U.S. market by the late USAF Lt. Col. Noel S. Alton and a business partner in the early 70s. The cards contained early contactless read-only technology that was unaffected by rain, dust, or most weather conditions. The startup company was acquired by Schlage Lock Company, and soon gained significant market penetration. Although the technology was reliable, weatherproof, and impressive, the high cost of cards, controller, and cabling, the proprietary architecture, and closed distribution system, limited growth.

The Wiegand-effect card was developed by German-born John R. Wiegand. The inventor refined the process with Echlin Corporation in the 1970s, as a means to trigger automotive ignition pulses. EAC applications soon followed. http://www.machinedesign.com/engineering-essentials/brushing-wiegand-man-effect-and-wire-changed-engineering     

The reader’s durability, low cost and the card’s strong resistance to counterfeiting allowed the technology to dominate the industry for nearly 20 years. The reader’s three-wire data protocol became the access control industry standard. Other historic card technologies include bar codes, Hall-effect, Barium Ferrite, Infra red optical, electrical circuits, and Hollerith (optical patterns). Various limitations have prevented each of these from becoming mainstream.

Radio Frequency Identification Device (RFID) chips have been used for inventory and retail loss-prevention for some time. The gold plated contact type electronic tag can have six or eight segment contacts like your current credit card, whereas the contactless type is not visible on the surface. These RFID chips have been inserted under skin for animal identification for several years, and recent tests have been done on humans.

RFID devices can be active battery-powered or passive read-only chips. The early low frequency chips typically operate at 125 KHz at short range, while the much faster high frequency chips run at 13.56 MHz, with read ranges available to several feet. Ultra High Frequency (UHF) RFID systems can operate from 856 to 960 MHz and can be sometimes read from 25 to 75-feet away, depending on transmission power and antennae. This latter type lends itself to vehicle gate operation and high speed toll collection applications.

The Near Field Communication (NFC) version of RFID operates at 13.56 MHz as a peer-to-peer communication device. NFC is currently used on smart phones for data transfer. NFC can use inductive current from the reader to power the transmission process from the chip. Operational distance of only 1 ½ inches make NFC ideal for contactless payment, banking and some access control applications.

Bluetooth Low Energy (BLE or Bluetooth Smart) 4.0 with its much faster 2.4 GHz speed, high capacity and selectable transmission distance, appears to have achieved overwhelming acceptance in the access control field and many retail applications. BLE technology can operate as a read-only device, or for peer-to-peer data transfer like NFC, only much faster. BLE is easily applied to your mobile credential (smart phone) with a simple software profiling action.

Multi-Technology cards were introduced to facilitate customer migration from earlier magnetic stripes, and from 125 KHz RFID Prox cards to the faster, high frequency 13.56 MHz. This allows customers to continually upgrade systems without wholesale disruption or the high cost of replacing readers.

Dormakaba’s Swiss-based Legic Identsystems introduced the first 13.56 MHz access control cards while Netherlands-based NXP corporation was developing the 13.56 MHz RFID MIFare system for fare collection and later, the encrypted DESFire protocol. This open architecture technology is now generally available on multi-technology cards.

Dual Validation protocols have been in force for some time with card and PIN numbers. Reliable performance of the on-board fingerprint reader is now allowing biometric verification to become a secure validation process. Since critical infrastructure, military, and high security operations are now requiring dual validation access controls, there will be considerable growth in this area.

Biometric enabled cards are now offered by Norway based Zwipe company. The on-card fingerprint reader verifies that the person using the card is indeed the one identified in the encrypted data. This technical advance is likely to have a profound effect on criminal use of credit cards, and access to bank accounts. The biometric card allows dual validation, along with the powerful encryption. An energy harvesting process uses inductive current from NFC readers to power the fingerprint reader.

These biometric cards are compatible with HID, Legic, and MIfare/DESFire systems in use around the world. Battery powered versions can also operate with legacy low-power 125 KHz prox readers without upgrading your customer’s infrastructure. Gemalto, Oberthur, SmartMatrix and others are building cards similar to Zwipe’s payment card. Be sure to specify correctly.

Global Net Solutions (GNS) of Torrance, CA has announced an IoT based biometric card called the S-Badge. The card uses AI and machine learning strategies that provides access control, tracks people on site, and provides an onboard panic button.

The major American success story has been HID, a company that cooperated with others in a win – win process with open architecture designs available to all.

Hughes Identification Devices has been a major American success story. The company was formed in 1991 by Hughes Aircraft Co. to develop RFID technologies for tracking aircraft parts. When acquired by Palomar Technological, the company’s name was changed to HID and it began to focus on 125MHz RFID cards for physical access control applications.

HID was acquired by ASSA ABLOY in 2001, and they completed transition from first generation 125 KHz prox cards to 13.56 MHz RFID iCLASS cards and readers. This second generation higher frequency technology allowed rapid two-way communication with mutual authentication for improved security.

A third generation iCLASS SE card has Secure Identity Objects with the user identity encrypted, encapsulated, and signed. SIO provides multiple layers of protection, with the individual’s encrypted data at the core, wrapped in an encrypted digital signature to authenticate proof of identity and that it is not altered. This content is then wrapped, bound to the device, and signed, yielding a Trusted Identity Platform (TIP).

The fourth generation called iCLASS Seos provides multiple encrypted databases within the credential. To communicate with a given database, the reader must have the proper key. http://www.emacs.es/downloads/WP/20140723_iCLASS_Seos_Card_Whitepaper_EXTERNAL_v1.0.pdf

The growing HID company singularly focused on providing cards and readers for access control manufacturers, integrators, dealers and installers. The open architecture cooperative strategy has allowed dramatic growth with HID dominating the Americas markets. The growing list of business partners in the U.S., Europe and other areas is an impressive business success story in itself.

Along the way, the company acquired card manufacturer Indala, the leading card printer manufacturer Fargo, and recently the Lumidigm multi-spectral fingerprint reader company. ASSA ABLOY is also the parent company of Sargent, Corbin Russwin, and Yale lock companies, which offer the full range of card technologies. Allegion and Best as well as most access control system suppliers also offer this open architecture technology.

Legic Identsystems division of dormakaba is another major player in the European market with increasing connections in North America, including Best. Legic’s encryption of the data and transport process puts firewalls between information from various applications or regions. BMW for example, runs 21 separate applications on a single Legic credenial.

Farpointe Data of Sunnyvale, CA offers cards and credentials, including long range applications for gate and high speed toll collection with Legic, HID, and MIfare/DESFire systems.

The good news for your customers is that these card and reader manufacturers are using open architecture technologies with multi-technology cards so you can future-proof your clients. This is in stark contrast to the “bad old days” when marketing strategies tried to control customers with proprietary systems, rather than serving their needs.

Cameron Sharpe, CPP worked in marketing for Caterpillar and Honeywell before serving 25-years with Best Lock Corporation in New Jersey and Arizona.