Choosing access control readers

15.11.2018

Choosing an RFID reader

Access control systems regulate access to a building or certain area, while usually permitting data be collected about transiting users. The characteristics and tasks you envision for your access system will inevitably require certain features from the readers you choose for it. These characteristics include interface, environmental tolerance, data protocol, identification technology, an ability to transact with other (e.g. mobile) devices and features that simplify or streamline reader installation. The disposition of all these factors will inevitably refine your options when seeking the best reader for your system.

It is why we often discuss these factors (listed below) when we help customers choose the best reader for their planned system solutions

Interfaces

Readers interact with your system via their interfaces. Your system might specify Clock & Data, Wiegand, USB, GPRS, RS232 or an RS485 interface, requiring a reader able to connect via that particular interface.

Data protocol

Data protocols like the standardized OSDP (either v1 or v2) or AES might also be indicated. Some customers prefer specifying their own protocol (which Idesco embeds in their readers) while others opt to use Idesco’s own RS485 data protocol. Note the OSDP and RS485 data protocols are bi-directional, permitting your system to send data ‘downstream’ to its readers – not merely receiving their transaction data from them. Such bi-directional data flow is a powerful capability because it can let you manage your readers from your system, simplifying updates in particular.  By contrast, data transmitted via Clock & Data and Wiegand interfaces is unidirectional – only sent ‘upstream’ from a reader to its system.

Identification technology

Pay special attention to the identification technology you choose for your system because it can significantly limit your reader choice. By contrast, if you select an open, standardized technology like MIFARE® it will let you shop for readers from a wide range of manufacturers. Obviously, this also applies to sourcing users’ transponders.

Your choice of identification technology can also limit how secure your system will be. MIFARE DESFire is one of the world’s securest technologies, capable of deeply encrypting the data stream between readers and transponders. Depending on the data protocol or additional security solutions you deploy, that deep security can also be extended to data transmitted between readers and their host. Lastly, if readers will be identifying mobile device credentials in addition to traditional transponders, or you plan to migrate completely to mobile device transactions, your readers will need to support Bluetooth, NFC or a similar protocol, depending on the capabilities of your system’s and your users’ mobile devices.

Data capacity

Your system’s planned tasks could demand greater transaction bandwidth from its readers. In general, readers that support the latest technologies also offer such greater data bandwidth. Such transaction bandwidth (and greater transponder data capacity) is most often found in applications either storing additional data in transponders’ memory blocks (e.g. payment systems), or in more secure systems that use complex ‘handshake’ verification protocols to secure transactions with encrypted transponder credentials (as opposed to unsecured factory-coded UIDs).

Inputs and outputs

A reader installed in a system may have outputs that let it control other devices. Additionally, a reader’s inputs can let you, your system, or the reader’s host control a reader’s buzzer or LEDs. For some readers, their inputs and outputs let you configure them for ‘stand-alone mode’, which lets them control electrical locks independently, without a system connection.

Features related to reader’s installation

A reader can be shipped with either an attached cable, a connector or even a convenient, fast-installing adapter plate that significantly speeds and simplifies installation. If you thread wiring well in advance of actual reader installation, adapter plates not only let you install readers in phases but will significantly shorten installation time; you simply just push readers onto their plates then secure them with screws.

Durability and impact resistance

Installations can vary widely, from comfort-regulated indoor office environments to the harshest industrial or outdoor settings with extremes of heat, cold, sun, moisture, dirt, reactive chemicals – and vandalism. This diversity can place a wide range of demands on your system’s readers. Although manufacturers usually guarantee basic storage and operational temperature ranges for their products, if you know your site’s readers will be exposed to vandalism or extremes of temperature, moisture or dust, check reader ratings (i.e. IP protection class and IK impact resistance) before you choose.

Other news

15.11.2018

8 CD 2.0 Pin Glass conveys a discreet Scandinavian elegance that makes it a seamless complement to more cultured or sophisticated sites

Read more
RFID protecting cargo

31.10.2018

Denmark’s Evotec recently chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.