Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

Access control system basics and the campus card administrator

CampusIDNews Staff   ||   Sep 01, 2003  ||   ,

If one based his impression simply on the ease with which the term security is used in conversation at trade shows and in meetings, it would be logical to assume that most people understand the basic concepts of access control technology. However, that is not the case. In this rapidly changing arena, it is easy to get caught up in the latest trend and newest technology. But these are of little value without a solid understanding of the operational building blocks. So bear with me as I use this column to setup the foundation for this special security issue of CR80News.

At its most basic form, a common access control system can be thought of in three separate parts or phases: (1) the network of door access readers connected to (2) a smaller network of field panels that are in turn connected to (3) a single host computer.

When a card is presented to a door access reader, the reader makes the first-level decision. If the first digits match a predefined system, agency, and/or site code, the card passes its first test. If it does not match, authorization is denied without further need to query the system.

Assuming the first level test is passed, the credential number is passed from the reader to the field panel. The field panel checks the credential number against a local list of recently seen credentials maintained in memory. The capacity of the field panel, or number of credential numbers it can maintain at any one point, is defined by the amount of onboard memory.

If the number is found in the list at the field panel, the credential is approved and authorization is sent back to the card reader granting access. If the number is not found, the panel passes the number on to the server to query the master database. The server checks the listing of all approved credential numbers and the final decision to accept of reject is sent to the reader.

While some systems connect the readers directly to the host computer and others have further interim points between the readers, panels, and host, the above description is an extremely common architecture.

Regardless of the architecture, the communication of data from the card reader to the field panel is a crucial component. This communication is typically conducted using a Weigand or RS-232 protocol. Any reader that can communicate via the specific protocol utilized by the security system can be attached to that system.

Card readers for access control systems come in a wide variety of technologies. Magnetic stripe, bar code, chip card, contactless card, proximity card and others are available. The key to the system is not the card technology used to communicate the credential number to the reader, but rather the protocol used by the reader to communicate with the field panel.

Think of the card or token merely as a container for the numeric credential. If a new type of reader can interpret data from the card or token and communicate with the field panel, then the access control system will operate exactly as it did when the previous type of reader was used. In fact, most systems can support multiple types of readers at the same time.

In the series of articles presented in this special security issue of CR80News, elements and components of security and access control are examined. While you may not be in charge of the security system on your campus, the importance of the campus card as the identifying credential makes it imperative that you are attuned to the basics of your campus’ physical security.

Chris Corum
Editor
[email protected]

Subscribe to our weekly newsletter

RECENT ARTICLES

CampusIDNews is hiring graphic
Jan 15, 26 /

Hiring full-time or freelance writers to join the CampusIDNews team

We are looking for writers – either full-time or freelance – to contribute to the campus ID, transaction system, and security industry’s leading publication. It’s fun, it’s challenging, and for the right person it’s pretty stress free. You get is to inform your higher ed peers about technology that can help them transform their campuses. […]
Phone being used at a handheld payment terminal
Jan 14, 26 /

Rogue payment points and the hidden risks across campus

Campuses function like small cities, with countless departments, clubs, and organizations collecting payments for everything from event tickets to meals. According to Michael Wilson, Director of Sales at TouchNet, this complexity often leads to what he calls rogue payment points. Rogues are payment systems adopted outside of institutional oversight, and they can spell big problems […]
Kim Pfeffer, EmoryCard Director interview
Jan 14, 26 /

Adapting campus card services for today’s always-on students

Today’s college students arrive on campus with expectations shaped by always-on technology and personalized digital experiences. Kim Pfeffer, Director of EmoryCard at Emory University, says her students expect services to be immediate, convenient, and tailored to their individual needs. They are hyper connected, she says, and they want access to services on their own schedule, […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.