Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

Access control system basics and the campus card administrator

CampusIDNews Staff   ||   Sep 01, 2003  ||   ,

If one based his impression simply on the ease with which the term security is used in conversation at trade shows and in meetings, it would be logical to assume that most people understand the basic concepts of access control technology. However, that is not the case. In this rapidly changing arena, it is easy to get caught up in the latest trend and newest technology. But these are of little value without a solid understanding of the operational building blocks. So bear with me as I use this column to setup the foundation for this special security issue of CR80News.

At its most basic form, a common access control system can be thought of in three separate parts or phases: (1) the network of door access readers connected to (2) a smaller network of field panels that are in turn connected to (3) a single host computer.

When a card is presented to a door access reader, the reader makes the first-level decision. If the first digits match a predefined system, agency, and/or site code, the card passes its first test. If it does not match, authorization is denied without further need to query the system.

Assuming the first level test is passed, the credential number is passed from the reader to the field panel. The field panel checks the credential number against a local list of recently seen credentials maintained in memory. The capacity of the field panel, or number of credential numbers it can maintain at any one point, is defined by the amount of onboard memory.

If the number is found in the list at the field panel, the credential is approved and authorization is sent back to the card reader granting access. If the number is not found, the panel passes the number on to the server to query the master database. The server checks the listing of all approved credential numbers and the final decision to accept of reject is sent to the reader.

While some systems connect the readers directly to the host computer and others have further interim points between the readers, panels, and host, the above description is an extremely common architecture.

Regardless of the architecture, the communication of data from the card reader to the field panel is a crucial component. This communication is typically conducted using a Weigand or RS-232 protocol. Any reader that can communicate via the specific protocol utilized by the security system can be attached to that system.

Card readers for access control systems come in a wide variety of technologies. Magnetic stripe, bar code, chip card, contactless card, proximity card and others are available. The key to the system is not the card technology used to communicate the credential number to the reader, but rather the protocol used by the reader to communicate with the field panel.

Think of the card or token merely as a container for the numeric credential. If a new type of reader can interpret data from the card or token and communicate with the field panel, then the access control system will operate exactly as it did when the previous type of reader was used. In fact, most systems can support multiple types of readers at the same time.

In the series of articles presented in this special security issue of CR80News, elements and components of security and access control are examined. While you may not be in charge of the security system on your campus, the importance of the campus card as the identifying credential makes it imperative that you are attuned to the basics of your campus’ physical security.

Chris Corum
Editor
[email protected]

Subscribe to our weekly newsletter

RECENT ARTICLES

Amy Surprenant, HID Global
Jun 26, 25 / ,

Effective project management key to GWU mobile credential launch

In a recent interview, HID Global’s Amy Surprenant discusses the project management component of the mobile credential launch at George Washington University (GWU). With 26,000 faculty, staff, and students, the project marked a significant milestone for the institution and its partners, including HID, CBORD, and various on-campus departments and vendors. The deployment of HID Mobile […]
replace allegion reader module
Jun 26, 25 / ,

FIT and Denison both go mobile, but with very different starting points

Denison University and Florida Institute of Technology (FIT) rolled out mobile credentials to students and staff across their campuses. The projects were very different, however, because of the existing reader infrastructure on the two campuses. Each partnered with Allegion and Transact + CBORD to deliver the new digital IDs – stored in Apple Wallet or […]
Jessica Bender, Palm Beach State College
Jun 19, 25 / , ,

Palm Beach State decides mobile credentials are not right for their campus

Palm Beach State College’s campus card office has opted to forego mobile credentials and stick with their longtime magstripe cards. While the decision may seem unusual to some, Jessica Bender, the college’s auxiliary services manager, explains to CampusIDNews the rationale and the research that went into it. With a student population of 40,000, the college […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2025 CampusIDNews. All rights reserved.