Card Encryption

A lot of discussion surrounds the use of encryption in Card Access. Below we explain the simple differences.

Access Control

As the title suggests , 'Control'

Who - Control Who uses a nominated door and track a History log of events

When - Control When a nominated door can be accessed

Where - Control what doors a nominated person can access

OR

Access

Allows persons entry and exit to nominated doors.

One step above a physical key system with the benifit of a history log.

Can be achieved with simple keypad or proximity controllers

Encrypted Reader & cards

Transmits a password to the Reader.

If the password matches the Readers password, sends a request back to the card for the identification code.

Identification code is sent to the controller, and checks users access levels

Benfits of encrypted

  • Conforms to the standard of 'Control'
  • Can not be copied
  • Single supplier creates uniform system
  • 2 stage authentication


Cons of encrypted

  • Read range is reduced.
  • Usually one supplier of cards



OR

UN-ENCRYPTED READER & Cards

Transmits an Identification code when presented to a door reader.

Identification code is sent to the controller, and checks users access levels

Benifits of Un-Encrypted

  • Cards can be purchased anywhere
  • Simple mode of operation

Cons of Un-Encrypted

  • Because cards can be purchased anywhere, no control
  • Low security check
  • Easily to copy of cards
  • No authentication


Discussions surround the benefits and cons of using a single supplier for your security services, and who is responsible for the encryption code.

Lets look at a few scenarios.

Un-encrypted Access control system.

Scenario 1

  • The Customer orders 50 Access cards from Security Company 1. The cards are numbered 101-150.
  • The Customer orders another 50 cards, but from a different Security Company (2). The cards are numberes 151-200
  • The Customer orders another 50 cards from Security Company 1. The original security company looks at their records, and orders card numbered 151-200.

Scenario 2

A card holder makes multiple copies of a card with a $25 fleabay scanner. The customer now has no way of linking the identification number to the employee, effectively losing 'control' of 'who'.