Campus ID News
Card, mobile credential, payment and security

Access control system basics and the campus card administrator

CampusIDNews Staff   ||   Sep 01, 2003  ||   ,

If one based his impression simply on the ease with which the term security is used in conversation at trade shows and in meetings, it would be logical to assume that most people understand the basic concepts of access control technology. However, that is not the case. In this rapidly changing arena, it is easy to get caught up in the latest trend and newest technology. But these are of little value without a solid understanding of the operational building blocks. So bear with me as I use this column to setup the foundation for this special security issue of CR80News.

At its most basic form, a common access control system can be thought of in three separate parts or phases: (1) the network of door access readers connected to (2) a smaller network of field panels that are in turn connected to (3) a single host computer.

When a card is presented to a door access reader, the reader makes the first-level decision. If the first digits match a predefined system, agency, and/or site code, the card passes its first test. If it does not match, authorization is denied without further need to query the system.

Assuming the first level test is passed, the credential number is passed from the reader to the field panel. The field panel checks the credential number against a local list of recently seen credentials maintained in memory. The capacity of the field panel, or number of credential numbers it can maintain at any one point, is defined by the amount of onboard memory.

If the number is found in the list at the field panel, the credential is approved and authorization is sent back to the card reader granting access. If the number is not found, the panel passes the number on to the server to query the master database. The server checks the listing of all approved credential numbers and the final decision to accept of reject is sent to the reader.

While some systems connect the readers directly to the host computer and others have further interim points between the readers, panels, and host, the above description is an extremely common architecture.

Regardless of the architecture, the communication of data from the card reader to the field panel is a crucial component. This communication is typically conducted using a Weigand or RS-232 protocol. Any reader that can communicate via the specific protocol utilized by the security system can be attached to that system.

Card readers for access control systems come in a wide variety of technologies. Magnetic stripe, bar code, chip card, contactless card, proximity card and others are available. The key to the system is not the card technology used to communicate the credential number to the reader, but rather the protocol used by the reader to communicate with the field panel.

Think of the card or token merely as a container for the numeric credential. If a new type of reader can interpret data from the card or token and communicate with the field panel, then the access control system will operate exactly as it did when the previous type of reader was used. In fact, most systems can support multiple types of readers at the same time.

In the series of articles presented in this special security issue of CR80News, elements and components of security and access control are examined. While you may not be in charge of the security system on your campus, the importance of the campus card as the identifying credential makes it imperative that you are attuned to the basics of your campus’ physical security.

Chris Corum
[email protected]

Subscribe to our weekly newsletter


Student card data at Alberta helps piece together campus life puzzle

Jennifer McNeill, manager of the ONEcard program at the University of Alberta, explains how card system data can potentially lead to a safer, more welcoming student experience. She describes how data collected from campus card transactions can be used to improve operations like dining, residence life, fitness and other vital campus tasks.
May 26, 23 / ,

Penn State adds mobile ordering to campus app

Penn State has added a mobile ordering feature to its comprehensive campus mobile app, Penn State Go. The Penn State Eats Mobile function is available for use by students on the flagship University Park campus, as well as across the university's Commonwealth Campuses.
May 26, 23 / ,

NAU leverages delivery robots to support late-night dining

Northern Arizona is leveraging Starship delivery robots and the mobile ordering app in a clever way to prop up late night dining, and putting a twist on the ghost kitchen concept. The university has launched its Hole in the Wall dining window that now serves either pickup or robot delivery for students by offering a number of dining concepts all from a single, concession-style window.
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.

Join us, @NACCUorg, and @TouchNet to explore how campus card programs can successfully navigate the sales and procurement process. Join the webinar on June 6, 2 pm EDT.

Webinar: Learn how the University of Arizona uses campus cards, mobile ordering, kiosks, lockers, and robots to revolutionize campus dining. April 7, 2-2:30 EDT. Register Now at

Load More...
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2023 CampusIDNews. All rights reserved.