In this article, you will get a complete overview of key card entry systems , and key card formats. Swiftlane, a provider of modern, cloud-based access control systems, has put together a guide to access card technologies that exist today. Use this guide to understand access card formats, their pros and cons, and evaluate your key card system needs.
Keys, throughout their technological evolution, have taken many forms. As such, so have key card access control systems as a whole.
For example, some of you may use a fob to get into your parking garage. Others may have a key card with your picture on it to get into your office building. When you go to a hotel, there is a good chance you will swipe a magnetic stripe card to get into your room.
Yep, these are all key cards.
The purpose is the same: to manage access to a particular area.
Key cards can be divided into different types depending on the technology they use to store data and communicate with the reader.
RFID stands for “radio frequency identification.” Data is stored in a microchip often referred to as an RFID tag. RFID cards have many variants, especially when it comes to key card entry systems. In fact, all key cards other than Wiegand and Magstripe use RFID technology to transfer data to the reader, but they have different working mechanisms.
Technology: RFID technology uses RF waves to read and transfer data. The RFID frequency bands utilized in cards include 125 kHz low frequency for proximity cards, 13.56 MHz high frequency for smart cards, and 860-960 MHz ultra-high frequency (UHF) for high range applications.
Applications: RFID cards, badges and tokens are used in an extensive range of diversified applications including key card access control systems, logistics and supply chain management, inventory and asset tracking, materials management, animal tracking, ticketing, marketing, healthcare, law enforcement, and more.
Printing and Encoding: RFID cards can be printed on using a printer similar to swipe card printers. Some of them can be encoded by the user while others may come precoded by the provider. RFID tags contain memory banks that can store varying amounts of data, from 96 bits or 128 bits (for license plate tags) to 64,000 bits (for high-security access control applications).
There are three types of contactless cards or badges for key card entry systems. These can be read from a distance and do not need to be inserted into the reader. All of them use RFID protocols but use different technologies to store and read data. They are proximity cards, smart cards, and NFC cards.
Proximity cards, sometimes called Proxcards or smart cards, are low frequency RFID cards and badges, which do not need to be inserted into the reader like swipe cards. Proximity cards typically work on 125 kHz LF band. These are read-only, contactless cards or badges that can store a limited amount of information.
Smart cards include a microcontroller instead of an RFID interface. Contactless smart cards can be read from a distance of up to 4 inches (10 centimeters). Typical smart cards have 8k storage capacity and 8-bit computing power.
Technology: The smart card secure microcontroller is an intelligent device that can perform complex functions; such as managing, storing, encrypting, and providing secure access to data. The technology also allows the card to authenticate the reader and prove its own authenticity, which makes smart cards more secure than RFID tags as they function in key card access control systems.
Security: The information stored in the smart card as well as the communication between the smart card and the reader can be encrypted. Smart cards are very difficult to duplicate and include a variety of hardware and software capabilities to detect and react against tampering attempts. The smart card can verify the authority of the device requesting the information and then give access to only the authorized information.
Applications: Smart cards are used in applications that require a higher degree of information and communication security, such as banking, government IDs, and passports as well as key cards and fobs for entry into secure facilities.
Encoding: The data and information on smart cards can be read, written or modified using advanced ID card software. A smart card reader can be connected with a computer through a USB cable and the data on the card can be used for access management and security applications.
NFC (Near Field Communication) cards, sometimes also called NFC smart cards, can be read using a smartphone or another NFC-enabled device. These cards contain a writable NFC chip that can be used to read and store messages, numbers, and other microdata using a NFC enabled smartphone.
Technology: NFC cards communicate through radio frequency signals. In that sense they’re also RFID cards. The main difference from RFID cards is that a NFC device can act as a tag and emulate a card. NFC operates on HF 13.56MHz frequency band.
Applications: NFC technology is used for contactless payments, access control, embedded advertising, loyalty programs, Internet of Things, workforce management, and numerous other applications.
Access Control: For secure access control purposes, any NFC mobile device can be configured to emulate a key card entry system and can be used to access a facility. The user has to touch the NFC token with the NFC reader, or bring it within 0.39 inches (<4cm) of the reader, for the data to be read. NFC is sometimes used in combination with Bluetooth and WiFi to boost the speed of data transfer between the NFC card emulator and the reader.
Proximity cards, chip-based smart cards, and NFC cards are all contactless cards that can be read without inserting the card into a reader. All of them are used in physical access control, but there’s a difference in the way they work.
Proximity Cards | 13.56 Mhz Smart Cards | NFC Cards |
Read distance (air interface) up to 15 inches | Read range up to 4 inches | Read range up to 4cm |
Most of them are passive cards that do not transmit | Can be passive or active cards with a transmitter | Can be passive or active |
Contain an RFID tag | Contain an intelligent microcontroller | Contain a NFC tag |
Most are read-only cards | Can be read or written to | Read and write |
No encryption | Data can be encrypted using algorithms | Can support encryption |
Store only facility code and card number | Can store facility code, card number, biographical info, pin codes, or monetary values in addition to facility code and card number | Can store customizable data that can be used by a computer for applications such as PIN code verification or to launch an app |
Cannot authenticate the device requesting the information | Can authenticate the device asking for the info and provide only the data for which that particular device is authorized | Can verify the asker’s identity before transmitting the data |
Work on LF 125kH | HF 13.56MHz | HF 13.56 |
RFID Reader | Smart Reader | NFC Reader |
Cheapest Option | More expensive but secure | More expensive but secure |
Hybrid key cards use a combination of technologies to enable a number of specific applications. For example, a magnetic stripe card can include a smart chip, where the stripe can be used for key card access control systems and the chip can be used for storing account information and withdrawing funds or making purchases. Contact-based and contactless smart cards or UHF and LF can be combined to deliver more flexibility usage, particularly as it pertains to key card entry systems .
Not to be confused with Wiegand card format for transmitting data in access control systems, Wiegand cards are based on a magnetic phenomenon called the Wiegand Effect. They use low-carbon Vicalloy, a ferromagnetic alloy of cobalt, iron, and vanadium, to store a unique number that can be read by a Wiegand reader. Filaments of Wiegand wire are embedded in a plastic key card to create a unique binary code that is tied to a specific person or item. Wiegand Cards were the earliest version of key cards and were introduced in the 1970s. They continue to be used to this day because of their simplicity and durability
The Wiegand Effect: In 1970, American inventor and musician John Wiegand discovered that when a specially treated piece of ferromagnetic alloy (the Wiegand wire) is exposed to a reversing magnetic field, it abruptly flips to opposite polarity within a few microseconds.
Early Applications of Wiegand Cards: The early version of plastic key cards had short lengths of Wiegand wire embedded into it. The wires were arranged in an array that represented a binary number. The presence of a wire would mean a 1 and an empty slot represented a 0.
Reading the Wiegand Card: When the card is swiped through a reader, it is exposed to a magnetic field, which triggers the polarity reversal in the embedded Wiegand wire. The reader detects the polarity reversal and can hence read the unique binary number hard wired into the key card.
How Wiegand Cards are Encoded: Wiegand cards cannot be printed using a contemporary key card printer. The Wiegand wire filaments are permanently embedded in the card, making them impossible to duplicate.
Are Wiegand Cards Still in Use Today? Wiegand cards have been largely replaced by more advanced credential technologies such as Magstripe and RFID. However, legacy access control systems continue to use the Wiegand protocol as a wiring standard for readers and controllers.
A magnetic stripe card, sometimes also known as a swipe card or magstripe, records credentials by modifying the magnetism of tiny iron particles embedded in a stripe of magnetic material on the card.
Magnetic Recording Technology: Swipe cards store data using the 1960s magnetic recording technology used in audiotapes. When the card is swiped, the data stored on the magnetic stripe is read by a magnetic head similar to those used in old cassette players.
Applications of Magstripe Cards: Developed by IBM almost 50 years ago, swipe cards are still being used in credit cards, identification badges, hotel key cards, loyalty cards, and transportation tickets.
How Swipe Cards are Encoded: Organizations can print and encode their own cards using magnetic stripe cardstock, ID software, and an ID card printer with a magnetic encoder.
Below are some considerations when choosing a key card entry system for your facility.
Use low frequency prox cards for lowest installation cost. These key card entry systems cost the least. However, they suffer from severe security risks in addition to high operational costs of replacing lost and stolen cards.
High frequency card formats, like 13.56 Mhz encrypted cards, offer high security as they cannot be replicated or cloned. These cards are more expensive and might require a more expensive reader to be installed as well. They also suffer from vendor lock-in often.
In 2020, mobile credentials are completely mainstream and most companies are looking to use smartphones for access. Face recognition is also being used for access to hundreds of millions of Apple phones via Face ID, and similar technology is ramping up for building access. Swiftlane provides a secure face recognition based access control along with its mobile credentials.
A key card entry system was revolutionary at its inception. It offered more flexibility in its capabilities to access multiple sites and could be reconfigured as needed. However, as technology has progressed, so too has our capability of better and more secure solutions.
Key cards are a legacy technology slowly losing the interest of those in the market for modern, durable solutions. To that point, with the advance of access control technology , key card entry systems are showing their limitations:
With advancements in the field of computer vision, face recognition access is becoming popular due to the high security and low friction for access.
Swiftlane’s cloud-based facial recognition solution is changing the way we view access control and security. As a cost effective and highly efficient option, Swiftlane offers a unique access control experience for all types of facilities.
Cloud-based access control has made it possible to use the credentials on your phone for access. Mobile access control has eliminated the need for additional tokens (key cards, fobs, etc.) while leveraging the device that 93% of Americans have with them all the time.
Still have questions about an access control system for your facility? Contact a Swiftlane expert to navigate your options and the best solution.
There are three types of contactless cards or badges for key card entry systems. These can be read from a distance and do not need to be inserted into the reader. All of them use RFID protocols but use different technologies to store and read data. They are proximity cards, smart cards, and NFC cards.
Do key cards use NFC or RFID? ›There are three types of contactless cards or badges for key card entry systems. These can be read from a distance and do not need to be inserted into the reader. All of them use RFID protocols but use different technologies to store and read data. They are proximity cards, smart cards, and NFC cards.
What is key card entry system? ›What is a Key Card Entry System for Businesses? Key card or key fob systems are helpful security tools that assist IT and security teams with securing their facilities. Additionally, these systems help grant access to offices and buildings or restrict access by preventing security breaches and unauthorized access.
What is the difference between a key fob and an access card? ›Access cards normally look like standard ID cards, but are occasionally a little thicker. Access key fobs are small plastic discs that contain internal technology. Fobs normally use proximity technology, though there are MIFARE ® discs and tags available. Most fobs are similar in size to a poker chip.
How do card entry systems work? ›A magnetic or swipe card access system works with cards with magnetic stripes on the back that can be read by an electronic card reader installed at each entry point. They're also called card swipe entry systems because they require the user to physically swipe the card.
Can you copy RFID to phone? ›However, if you have an Android phone, you don't even need a separate reader to do this, since Androids are equipped with an NFC reader. Yes, NFC cards can be cloned with a smartphone!
Can a phone read RFID? ›NFC enabled phones can ONLY read NFC and passive high frequency RFID (HF-RFID). These must be read at an extremely close range, typically a few centimeters. For longer range or any other type of RFID/active RFID, you must use an external reader for handling them with mobile devices.
What frequency do hotel key cards use? ›HF 13.56 MHz RFID ISO Cards - Personnel Badges
Commonly known as employee badges or hotel room cards, ISO Cards of HF 13.56 MHz are commonly used for access control & security needs.
How much does a key card system cost? ›Cost of Key Card and Key Fob Entry Systems
Key card and key fob access solution generally costs $1,000-3,000 per door. when you include the readers, panels, wiring network configuration and training. On top of that, there is an additional cost of $3 to $10 per card or $5 to $50 per fob.
What is the difference between key card and master card? ›Different Kinds Of Debit Card Transactions
Not only is there more access with a MasterCard option, there are also more ways to use the debit card. Transactions with a Keycard, for example, involve tapping, inserting the card into an ATM or swiping through an EFTPOS machine and following the prompts.
The most basic difference between the two is that a transponder unlocks a vehicle without using a physical locking mechanism or key, and the engine will not start without it. A remote key can also unlock the vehicle's doors, but if the remote control unit does not function, the traditional flat key can be used.
How do I know if my card is RFID? ›If you're not sure whether your card is RFID enabled, you can easily check by taking a look at the card. RFID-enabled cards have a logo on the front or back of the card that looks like a Wi-Fi symbol turned on its side. This symbol is meant to represent the radio frequency used by the card to make it contactless.
Do all key fobs have a key? ›Almost all automakers hide a small mechanical key inside the fob. There is usually a small catch that allows the spare key to pop out. If you can expose the little mechanical key, you can then insert it into the lock opening in the driver's door, and you're in.
What are the disadvantages of key cards? ›DISADVANTAGES OF ELECTRONIC KEY CARDS
The electronic card may be stolen or lost. In this event that your card is stolen or lost , there is a possibility of unauthorized. They are also easily damage by magnets and wear out quickly. use of proximity cards won't get worn out quickly and are resistant to being damaged.
What is the first step of access control? ›In the context of access control, identity is the first step in the authentication and authorization process.
Are all FOBS the same? ›Not all door and gate fob systems work the same. There are many types of key card and fob systems out there. Each one uses a different technology to deliver signals to the access reader.
Do hotel key cards use NFC? ›The NFC technology allows the card to communicate with the hotel key card system without them physically touching. So like RFID cards, the cards don't have to be "swiped" for the card reader to receive access to the room. Some people also call an NFC card “smart cards” because of their different capabilities.
Do keys have RFID? ›Modern key fobs work through RFID, an intelligent barcode system that uses electromagnetic fields to identify and track data on “tags” containing stored information. The information then passes through radio waves.
What type of cards use RFID? ›High Frequency (HF) RFID chip
Newer debit and credit cards. Passports. New ID and access cards. Hotel keys.