Campus ID News
Card, mobile credential, payment and security

Access control system basics and the campus card administrator

CampusIDNews Staff   ||   Sep 01, 2003  ||   ,

If one based his impression simply on the ease with which the term security is used in conversation at trade shows and in meetings, it would be logical to assume that most people understand the basic concepts of access control technology. However, that is not the case. In this rapidly changing arena, it is easy to get caught up in the latest trend and newest technology. But these are of little value without a solid understanding of the operational building blocks. So bear with me as I use this column to setup the foundation for this special security issue of CR80News.

At its most basic form, a common access control system can be thought of in three separate parts or phases: (1) the network of door access readers connected to (2) a smaller network of field panels that are in turn connected to (3) a single host computer.

When a card is presented to a door access reader, the reader makes the first-level decision. If the first digits match a predefined system, agency, and/or site code, the card passes its first test. If it does not match, authorization is denied without further need to query the system.

Assuming the first level test is passed, the credential number is passed from the reader to the field panel. The field panel checks the credential number against a local list of recently seen credentials maintained in memory. The capacity of the field panel, or number of credential numbers it can maintain at any one point, is defined by the amount of onboard memory.

If the number is found in the list at the field panel, the credential is approved and authorization is sent back to the card reader granting access. If the number is not found, the panel passes the number on to the server to query the master database. The server checks the listing of all approved credential numbers and the final decision to accept of reject is sent to the reader.

While some systems connect the readers directly to the host computer and others have further interim points between the readers, panels, and host, the above description is an extremely common architecture.

Regardless of the architecture, the communication of data from the card reader to the field panel is a crucial component. This communication is typically conducted using a Weigand or RS-232 protocol. Any reader that can communicate via the specific protocol utilized by the security system can be attached to that system.

Card readers for access control systems come in a wide variety of technologies. Magnetic stripe, bar code, chip card, contactless card, proximity card and others are available. The key to the system is not the card technology used to communicate the credential number to the reader, but rather the protocol used by the reader to communicate with the field panel.

Think of the card or token merely as a container for the numeric credential. If a new type of reader can interpret data from the card or token and communicate with the field panel, then the access control system will operate exactly as it did when the previous type of reader was used. In fact, most systems can support multiple types of readers at the same time.

In the series of articles presented in this special security issue of CR80News, elements and components of security and access control are examined. While you may not be in charge of the security system on your campus, the importance of the campus card as the identifying credential makes it imperative that you are attuned to the basics of your campus’ physical security.

Chris Corum
[email protected]

Related Posts

Subscribe to our weekly newsletter


Transact partners with Reusables containers
Jun 14, 24 / ,

New integration enables Transact clients to deploy Reusables’ container solution

This week, Transact announced a new partnership with Reusables, a platform that enables students to check out and return reusable containers using their campus cards or mobile credentials. The integration between the two companies requires no additional app downloads, allowing students to easily and quickly begin using the system. Reusables is a Vancouver-based company dedicated […]
Southern Illinois University ID card

Southern Illinois uses summer to upgrade from mag stripe to contactless

This summer, Southern Illinois University is launching a new contactless campus card for students, faculty, and staff. Along with the new ID technology, the card will also feature an updated design. The prior mag stripe card will continue to be supported, but existing cardholders will have the option to upgrade their card. In July through […]
Virginia Tech access control readers from Allegion

Virginia Tech's multi-year journey eliminates brass keys from campus

  At Virginia Tech, a strategically planned, multi-year process has eliminated physical keys from the campus. Brass keys have been replaced by card access in buildings and residence halls. The only remaining keys are stored in secure key boxes for security personnel and residence hall advisors to access in case of emergencies or after hours […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself.

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2024 CampusIDNews. All rights reserved.