Access control with an RFID card and an RFID reader

How to buy access control RFID cards?

If you need to buy access control RFID cards or tags, you probably already have a relationship with the company that installed your access control system.

If you don’t yet have such a system but are considering one, we invite you to learn more here about the access control options available to you.

 

Identify your needs. What kind of RFID cards or tags do you prefer?

  • Cards
    • A programmable credit card size plastic card that can also be printed
  • Keyfobs
    • Keyfob is a programmable RFID tag with printable marking that you attach to your keyring.
  • Mobile access credential residing in your phone
    • Access rights in mobile phones are now growing popular rapidly.

Technology and security

  • Your tags or cards must use the same technology as your site’s RFID readers.
  • System providers will usually propose the technology suitable to your site.
  • Modern RFID technologies are usually secure. Yet be aware that older technologies allow cards and tags to be cloned if they fall into the wrong hands. Carefully consider how much risk you can accept before choosing one. Older technologies only read the unique serial number (also known as UID, or Unique Identity) of a card or tag.
  • Therefore, the more sensitive your security is, the more important it is to choose a secure RFID technology such as MIFARE DESFire. DESFire prevents card and tag cloning.
  • To strengthen security, also consider adding a pin code requirement that users must fulfill after their card or tag is read.

Open or closed technology

  • A closed technology forces you to buy RFID readers and cards from a single manufacturer.
  • By contrast, an open technology is based upon an internationally accepted standard. That standard is what ensures cards, tags and readers from different brands will be compatible with each other.
  • If you choose an open technology, be sure to retain ownership and/or control over your RFID security keys. Your readers and cards or tags are programmed with those keys. If you don’t keep ownership of them and later switch to a different system vendor, your old vendor may deny transfer of your security keys to the new vendor.

 

Purchasing RFID tags, cards and mobile credentials

  • Many different web shops sell RFID tags or cards, if you already know what you want and what works with your access control system.
  • You can also buy directly from RFID tag and card manufacturers.
  • Most RFID reader manufacturers also sell tags and cards compatible with readers they sell.
  • Your system provider’s familiarity with your site means they know best your tag or card requirements.
  • Your provider can also advise and guide you about the requirements for mobile access credentialing.

Customizing tags and cards

  • RFID cards are easily customized with printed logos or branding, identifier numbers, or programming site-specific security keys.
  • The same applies to keyfob tags, except they cannot be printed with images

Choosing your RFID card or tag vendor

  • Always ensure you buy from a vendor that is reputable, that follows strict information security practices and complies with environmental sustainability regulations.

Want to learn more about access control?  Idesco is an RFID reader and card supplier, headquartered in Oulu, Finland. We make products to perform identification and provide access control security across a broad range of applications.

While we don’t sell access control systems, a great number of system providers around the world choose our devices. We warmly encourage you to learn more. We will happily guide your journey across the world of RFID and automated access control!

More than just cards and tags

Download free guide

How can I strengthen my overall system security?

Overall physical security demands careful consideration of many factors. Modern access control technologies are an integral aspect of the overall system security keeping your personnel, buildings and assets safe. There are also other factors you should consider, from a system’s data transfer protocols to crucial human factors. If you are curious to learn more, please download free guide: How can I strengthen my overall system security?

 

Download free guide about system security