Magnetic Stripe Card

Integrated Identification Technology

Clifton L. Smith , David J. Brooks , in Security Scientific discipline, 2013

Magnetic Stripe Cards

Magnetic stripe cards employ the same conventional magnetic recording applied science used for audiotapes, and are currently used with credit and debit cards. They consist of a standard coercivity plastic card to which a strip of magnetic record is applied. This standard tape strip contains three magnetic tracks that are used to store the card's code information. The card is usually presented to the reader by swiping or inserting it into the reader, which obtains the card's code using a magnetic head that detects the magnetic field generated past its strip.

The advantage of magnetic stripe cards is that their codes can be inverse after manufacture by reprogramming, and as credit and debit cards, they can also feature text and images and be used as identification badges. Disadvantages arise considering these cards require swiping or insertion into a reader resulting in wear over fourth dimension. In general, magnetic stripe cards offer a relatively depression level of security.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780123944368000072

Domain iii: Security Engineering (Engineering and Management of Security)

Eric Conrad , ... Joshua Feldman , in CISSP Study Guide (Third Edition), 2016

Smart Cards and Magnetic Stripe Cards

A smart card is a physical access control device that is ofttimes used for electronic locks, credit card purchases, or dual-gene hallmark systems. "Smart" means the bill of fare contains a computer circuit; another term for a smart carte du jour is "Integrated Circuit Bill of fare" (ICC).

Smart cards may be "contact" or "contactless." Contact cards must be inserted into a smart card reader, while contactless cards are read wirelessly. 1 type of contactless card engineering science is Radio-Frequency Identification (RFID). These cards contain RFID tags (besides called transponders) that are read by RFID transceivers.

A magnetic stripe carte contains a magnetic stripe that stores information. Unlike smart cards, magnetic stripe cards are passive devices that contain no circuits. These cards are sometimes called swipe cards: they are read when swiped through a card reader.

Many international credit cards are smart cards, while magnetic stripe cards are more normally used as credit cards in the United States.

Note

The "Common Admission Card" (CAC), every bit shown in Figure 4.41, is an case of a worldwide smart carte deployment by the U.Southward. Department of Defence force (DoD). These cards are used for physical access control as well as with smart card readers to provide dual-gene hallmark to disquisitional systems. CAC cards store data including cryptographic certificates as part of the DoD'southward Public Key Infrastructure (PKI). In improver to providing strong authentication, the cards allow users to digitally sign documents, amongst other uses.

Figure iv.41. A The states Department of Defense CAC Smart Card [34]

Both smart and magnetic stripe may be used in combination with electronic locks to provide physical access control. This approach offers superior accountability when compared with mechanical locks: audit data can be collected electronically, showing a tally of all personnel as they enter and exit a building. This data can likewise exist used for safety purposes, providing the prophylactic warden with an authentic census of personnel who must be accounted for during an evacuation.

Read total chapter

URL:

https://world wide web.sciencedirect.com/scientific discipline/commodity/pii/B9780128024379000047

Managing Access Control

John J. Fay , David Patterson , in Contemporary Security Management (Quaternary Edition), 2018

Review Questions

ane.

Why do businesses employ access control systems?

2.

List three types of identification cards.

three.

Describe the differences between a magnetic stripe bill of fare key and a proximity card key.

4.

Which type of identification method would be best for hotel room access? Access to a business concern function? To a nuclear facility?

five.

Give an example of layered protection.

half-dozen.

What is biometrics?

7.

Name at least ii problems associated with the fingerprint method of biometric identification.

8.

Proper noun at least two advantages and at least ii disadvantages associated with the use of a airtight circuit television (CCTV) in an intrusion detection system (IDS).

9.

Proper name the basic components of an intrusion detection organisation (IDS).

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9780128092781000128

Interfacing to Legacy Systems and Emerging Technologies

Thomas Norman CPP, PSP, CSC , in Integrated Security Systems Pattern (2nd Edition), 2014

Access Card Legacies

One of the most expensive challenges awaiting organizations wishing to integrate their diverse alarm/access control systems is that there may be numerous different card types, with varying card chip formats. Some sites may use magnetic stripe cards, others may use Wiegand swipe cards, all the same others may use one brand or another of 125-kHz proximity cards, and some may employ smart cards. Of course, where the card formats are the same, it is possible that the fleck formats may withal differ.

Therefore, i of the biggest challenges is for the organization to brand a determination regarding what access command card engineering science to use. At the time of the writing of this book, the National Transportation Workers Identification Card (TWIC) provides a single compatible credential that is more hard to counterfeit and misuse than many by cards. Several dissimilar card technologies are all present on a single TWIC card, including a biometric credential reference standard for the cardholder that is embedded in the smart card, magnetic stripe, and smart card affect or touchless technology. TWIC carte du jour concepts are a good choice to use to merge older card populations into a single new standard.

Read total affiliate

URL:

https://www.sciencedirect.com/science/commodity/pii/B9780128000229000139

Physical Security Integration

Anthony C. Caputo , in Digital Video Surveillance and Security (Second Edition), 2014

Electronic Admission Control and Management

Electronic access command (EAC) is the technology used to provide and deny concrete or virtual admission to a physical or virtual infinite. That infinite can be the building itself, the MDF, or an executive suite. EAC includes technology as ubiquitous equally the magnetic stripe menu to the latest in biometrics. EAC provides technology for:

Controlling who tin get where and when

Controlling traffic in and out of areas

People

Vehicles

Accountability

The do good for access control direction systems is the increased overall security of the physical (and virtual) domain. Company control and accountability are too of import, with each event and transaction existence recorded. The organization can generate instantaneous warning responses and reports for management review.

The types of EAC include:

Discretionary. Discretionary access may include upper management's conclusion on who can read, write, or execute select files and services. This type of admission is mostly used in MDF and/or sensitive file facilities.

Mandatory. Mandatory access allows a user to create new information but does not grant them authoritative privileges to that information. They can create just cannot determine who can access and modify that data. This blazon of access is widely used in military machine and financial institutions.

Role-based. Part-based is 1 of the virtually common group-based physical access control systems. Access is determined by the user'due south role in the arrangement. For example, centre management has access to the 2nd flooring; upper management is allowed admission to all floors, and everyone else is limited to the starting time floor.

Rule-based. Rule-based access is the most common modern EAC; it is usually IP-based and is rooted in a predetermined rules configuration. EAC is simply the rules outlined to monitor and control who can become where and when.

The general access control process may involve an employee swiping a magnetic card through a cardholder or presenting a smart card to a reader; either way, information is passed from the card to the reader. The data, typically a numeric code, is sent from the reader to a data controller unit or control panel. That controller validates the who, what, where, and when of that information based on data format, programmed reader location, time, and whether the cardholder has permission to admission that specific location at that fourth dimension. Once the controller determines whether the cardholder, time, and place are valid, access is either granted or denied by information being sent back to the reader. A transaction record is logged into the host organisation for futurity audits and review.

Admission CARDS

The magnetic stripe cards used in a diverseness of applications have an embedded numerical code hidden equally an invisible magnetic barcode on the magnetic stripe. The swipe reader can make up one's mind who, what, and when via that encoded number.

A smartcard contains a computer chip that is programmed for the aforementioned application. Smartcards are typically made of thick plastic and tin be read wirelessly by the smartcard reader from several inches away or even through article of clothing. If a magnetic stripe menu becomes damaged, it may possibly still function, just if the microchip inside the smartcard is damaged, information technology'due south completely useless.

An access command system reduces risk by limiting potential losses from theft and protects intellectual belongings, staff, and visitors.

EAC systems reduce the overall cost of security, just besides, because they are somewhat omnipresent systems, they can better monitor physical locations at any time. There is no demand for eliminating and/or rekeying locks and replacing lost keys, considering changing the keys is every bit simple as denying all access to a item individual'south numeric lawmaking.

Although electronically monitoring the physical and virtual environs is an important function of all surveillance and security systems, the one chemical element defective is apparent in the limitations of a completely numerical organization: At that place is no guarantee that the person the smartcard lets into the function is the person who is supposed to be using that smartcard. This is where integration with the DVS organization becomes even more powerful. As discussed in Chapter 1, the primary reasons for video surveillance are deterrence, establishing a capable guardian, efficiency in security deployments, and detection. Integration of an access command system provides the VMS organisation with additional automated information to successfully achieve those goals and create a centralized location for security management.

Read total chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780124200425000113

Access Command and Badges

Joseph Nelson CPP , in Effective Physical Security (4th Edition), 2013

Access Cards

1.

Proximity cards. Proximity admission cards are almost often used for EA systems. They piece of work via the utilise of passively tuned circuits that have been embedded in a loftier-grade fiberglass epoxy card. 1 can gain admission when the cardholder holds the card inside 2 to iv inches from a carte du jour reader. The reader's sensor detects the pattern of the frequencies programmed in the card, and it communicates with the sensor by electromagnetic, ultrasound, or optical transmission. This blueprint is then transmitted to the system's computer. If the pattern matches that of the reader, the reader unlocks the door and records the transaction. If the pattern does non match, no access is granted and this transaction is recorded.

two.

Magnetic stripe cards. Magnetic cards use various kinds of materials and mediums to magnetically encode digital data onto cards. To gain access the card user inserts or "swipes" (passes the badge through) the carte du jour reader. Equally the card is withdrawn from the reader, it moves beyond a magnetic caput, similar to that in a tape recorder head, that reads the data programmed in the carte du jour. The data read from the menu is sent to the system'south computer for verification. If verification is fabricated, the computer sends a indicate to the carte reader to grant or deny access, and if access is granted, the door is unlocked. Magnetic cards await like regular credit cards. The virtually popular medium for this type of admission bill of fare is a magnetic stripe on which a pattern of digital information is encoded. This type of bill of fare is relatively inexpensive and a big amount of data tin can exist stored magnetically compared to other kinds of magnetic media. These cards tend to bit and break, even so, through excessive use.

three.

Weigand cards. Weigand-based admission control cards use a coded blueprint on magnetized wire embedded within the card. When this card is inserted into a reader, the reader's internal sensors are activated past the coded wire. This type of card is moderately priced and will handle a big corporeality of traffic. Information technology is less vulnerable to vandalism and weather condition effects than other types of cards, but information technology does stand upward to a considerable amount of wear and tear.

4.

Biometrics access control. Biometrics is most accurate when using one or more fingerprints, palm prints or palm scan, paw geometry, or retina and iris browse. Remember deterrent controls filibuster unauthorized access. Think proactive management.

5.

Biometric ID systems operate locks to doors. Used in high-security areas where limited admission is maintained, this system checks physical characteristics that verify and allow access/entry.

six.

Smart cards. These comprise an integrated chip embedded in them. They have coded memories and microprocessors; hence, they are like computers. The technology in these cards offers many possibilities, particularly with proximity-card-based card access systems. Optical cards have a blueprint of low-cal spots that tin can be read past a specific low-cal source, commonly infrared. Capacitance cards use coded capacitor-sensitive fabric that is enclosed in the carte. A electric current is induced when the carte activates a reader that checks the capacitance of the card to make up one's mind the proper access lawmaking. Some access devices come in the shape of keys, disks, or other convenient formats that provide users with access tools that look attractive and subdued just at the same time are functional.

7.

Dual-technology card. Some cards take dual engineering, such as magnetic stripe/proximity carte and an RFID/proximity carte du jour.

eight.

Menu readers. Card readers are devices used for reading admission cards. Readers come up in various shapes, sizes, and configurations. The most common reader is the blazon where the card user inserts the card in a slot or runs or "swipes" the carte du jour through a slot. The other type of reader uses proximity technology where the card user presents or places the card on or nearly the reader. Some insertion-type card readers utilize keypads; afterwards the user inserts the carte du jour, the user enters a unique lawmaking number on the keypad. This activity then grants access.

nine.

Electronic access control (EAC) systems applications. Ideally used as office of a fully integrated facility management arrangement. In such a system electronic access control is interfaced and integrated with burn down safety/life safety systems, CCTV systems, communication systems, and nonsecurity systems such as heating, ventilation, and air conditioning (HVAC). In an integrated system, EAC systems permit users to be accessed into diverse areas or limited areas. They tin track access and provide attendance records. As a safety feature and for emergency response situations, they tin can determine where persons are located in facilities. In general, EAC systems are very flexible and strides in technology have made them even more than then.

This section barely covers all that you need to know near EAC. The all-time way to learn almost EAC is to actually piece of work with EAC systems. Take reward of every opportunity to work with EAC systems. Seek assignments where EAC systems are used, and inquire questions from control room operators, your supervisors, and EAC vendors and service technicians. There are many first-class sources where yous can read most EAC and related systems.

Read total affiliate

URL:

https://www.sciencedirect.com/science/article/pii/B9780124158924000134

Industry History That tin Predict the Future

Thomas L. Norman CPP/PSP , in Electronic Access Command (Second Edition), 2017

Chapter Summary

1.

First generation alarms used McCulloh Loop telegraph-blazon warning circuits.

2.

First generation admission control systems were single-door assemblies and are still bachelor as hotel room door locks.

3.

The second generation of access command systems networked eight card readers together to a defended calculator that was about the size of a huge early electronic desk calculator.

4.

The second generation of warning systems replaced the meters and paper tapes of the first generation alert systems with colored lamps and (at concluding) an aural warning.

v.

The 3rd generation of warning/access control systems began in 1968 and connected until about 1978. For the get-go fourth dimension, third generation systems combined alert and admission control into one organization.

six.

Up to 64 carte readers and upwardly to 256 alarm points were wired home-run style to a PDP-eight or IBM Series 1 mini-figurer. These often used core memory, a beehive concluding, and a line printer.

7.

In 1971, Intel introduced the first 4-scrap microprocessor, the 4044. This became the ground for a new kind of alarm and admission control organization technology chosen distributed controller systems. This was the outset of forth generation access control systems.

8.

Fifth generation warning and access control systems are all based entirely on software-based functions (mostly SQL language) and reference databases, whereas earlier systems were based on functions that were defined in hardware.

Q&A

1.

Alarm/access control systems are in most cases:

a.

Part of the digital video Arrangement

b.

Used mostly to control visitors

c.

Function of a larger integrated Security Organization

d.

Split up systems on divide computers

2.

Beginning generation alarm systems were:

a.

McCallan line systems

b.

McCulloh Loop systems

c.

McDonalds warning systems

d.

McWilliams alarm systems

iii.

First generation admission control systems can:

a.

Provide access to no more than than eight doors

b.

Provide access simply to magnetic stripe cards

c.

Nevertheless be constitute on old buildings

d.

Still exist found on hotel room doors

iv.

Second generation alarm systems:

a.

Replaced sound annunciators with colored lamps

b.

Replaced meters and paper tape with colored lamps

c.

Replaced near guards

d.

Replaced well-nigh guard dogs

five.

Second generation access command systems:

a.

Networked eight card readers together to a computer the size of a 4-drawer filing cabinet

b.

Networked viii carte du jour readers together to a computer the size of a large early electronic figurer

c.

Networked 24 card readers together along a continuous coax cable

d.

Networked 24 card readers together along a common circuit at distances non to exceed 100   m

6.

Third generation alarm/admission control systems:

a.

Wired menu readers and alarms to a computer the size of a 4-drawer filing cabinet

b.

Used plug-in dynamic random-admission memory

c.

Used dot matrix printers

d.

Used color televisions as estimator monitors

7.

Fourth generation alarm/admission control systems:

a.

Used detached transistors for processing

b.

Used Nixie Tubes for displays

c.

Used the first microprocessors as CPUs

d.

Used highly educated guards to monitor them

8.

Quaternary generation alarm/admission command systems were the beginning to use the concept of:

a.

Distributed processing

b.

Distributed carte readers

c.

Distributed consoles and monitors

d.

Distributed ability supplies

9.

By the mid-1990s, organizations wanted to integrate:

a.

Their employees racially

b.

Their remote offices into many fewer locations

c.

Alarm, access command, CCTV, and intercoms into a single system

d.

Alarm, access control, business calculator network, and irrigation systems into a single system

10.

Quaternary generation alert/admission control organization architecture functions were defined by:

a.

Their logical attributes

b.

Their physical attributes

c.

Their programmers

d.

Their operators

eleven.

Fifth generation alarm/access control systems are based on:

a.

Software-based functions (by and large SQL linguistic communication)

b.

Hardware-based functions (more often than not EPROMs)

c.

ANSI standards

d.

Archimedes principle

12.

In the past, several alarm/admission control arrangement manufacturers used _____ to ensure good sales as organizations grew.

a.

A highly trained sales force

b.

A highly trained technical strength

c.

Highly trained monkeys

d.

Planned obsolescence

13.

Microcontrollers:

a.

Are modest, single- or double-door controllers that communicate via TCP/IP

b.

Are small-scale egg-shaped elements that control nearly functions in the system

c.

Are pocket-size battery-powered elements that control but the door lock

d.

Are minor battery-powered elements that communicate via RS-485

fourteen.

In the future, microcontrollers may include:

a.

A video photographic camera

b.

An intercom

c.

A four-port digital switch

d.

An eight-port digital switch

Answers: (one) c; (2) b; (iii) d; (4) b; (five) b; (6) a; (7) c; (8) a; (nine) c; (10) b; (11) a; (12) d; (13) a; (xiv) c.

Read full chapter

URL:

https://www.sciencedirect.com/scientific discipline/article/pii/B9780128054659000166