With increasing security and public health concerns, contactless credentials are gaining more and more importance. Contactless credentials can be divided into two main categories: soft credentials that include mobile phone applications that tap into their BLE/NFC hardware and transmit the data, and hard credentials that typically include low frequency (125 kHz) and high frequency (13.56MHz) based passive RFID transponders.

With the help of these credentials, organisations can tackle safety concerns related to other common user authentication and access control solutions such as biometrics, password/PIN, and magstripe.

OEMs and system integrators

Currently, RFID readers can be found in numerous devices requiring user authentication, authorisation, and access control, from doors to multifunction printers to point of sale terminals to computers and more.

One of the main goals of an OEM or a system integrator should be to select a reader that is “future proof”

As OEMs and system integrators increasingly consider adding a security aspect to their product, choosing an appropriate RFID reader becomes that much more important. One of the main goals of an OEM or a system integrator should be to select a reader that is “future proof” or built to sustain the advancement or shift in the market from a technical standpoint.

Hard or soft credential

Furthermore, it should be kept in mind that customers have varied needs and requirements. This is especially true when dealing with customers that use contactless credentials.

Depending on the type of customer even the type of hard or soft credential will vary. For example, a product deployed in a university will have different security needs compared to the one deployed in a federal office. Not only the credentials are different in the above scenario but the level of security is different as well.

Customisation consideration goals

This article covers some of the important customisation considerations that can help satisfy OEM’s or integrator’s goals of a future-proof device and also a device that can accommodate the requirements of different customers.

Can the reader's output format be changed or adjusted?

There are instances with a requirement to match credential IDs that are already part of the end user’s database

The reader is typically a small component of the product manufacturer's ecosystem. Usually, the embedded product has a host that runs its application that interacts with a backend system or a database. There are instances with a requirement to match credential IDs that are already part of the end user’s database or active directory.

In systems where the host application cannot manipulate the reader's data, it becomes very important that the reader can manipulate and adjust its output to help match the credential ID stored in a database.

Can the reader read multiple technologies with the same hardware?

There are numerous RF standards and technologies present in the market. Some examples of RF standards are ISO14443A/B, ISO 15693, etc., and some examples of RF technologies are NFC HCE, EM4x02, Prox, etc. The reader must be able to fully support these transponders. This not only ensures that the RFID reader is capable of detecting the technology, but it ensures that it can support them to its full extent.

For example, users may use a UID (unique identification number) as a credential ID and in some instances, users employ memory-based transponders that contain the credential ID stored in one of the memory sectors. So, it is critical that the reader not only supports reading the UID but also the memory segments of the transponder.

Does the reader have reconfiguration flexibility post integration?

Having the flexibility to change the reader's firmware or configuration is necessary when considering an embedded product with a reader integrated as a subsystem. This allows the reader's software to be updated in the event a new credential is added to the customer's fleet or in a scenario where the customer decides to opt for a higher security-based credential.

Look for the capabilities of remote and/or contactless reconfiguration, updates, and upgrades

Although the feature to be able to reconfigure the reader is critical, it is even more important to have a reasonable way of updating the readers. Imagine an instance wherein the readers are embedded within the user’s end products and the only method available to update the reader is by dismantling it from the enclosure.

Now, compound this effort with a distributed fleet of hundreds of such devices with readers embedded in an enclosure. To avoid such a daunting task, look for the capabilities of remote and/or contactless reconfiguration, updates, and upgrades such as over-the-air via NFC or BLE, or via contactless RFID configuration card or app.

How does the reader integrate with the host application software?

When Elatec refers to the host application, it is referring to the software component that directly interacts with the reader. Typically, the reader either communicates with the whole system as a keyboard device or as a serial device. There are also instances wherein the host application expects the reader to work as a PC/ SC (personal computer / smart card) device.

It is very important to understand the software specifications of the host application as it directly affects the functioning of the reader. One should evaluate if appropriate drivers are being made available to the embedded designers and whether the reader will be able to appropriately interact with the host via standard software communication protocols.

Even though there is a certain amount of software development necessary for the communication to occur between embedded devices. Whether or not this effort can be reduced is a question one should evaluate when choosing the reader.

Can the communication protocol be customised?

In embedded design projects, one of the key aspects is the execution of embedded applications that are created for a very specific purpose. For example, the end goal of the embedded product could be to complete a secure transaction or exchange information under time constraints.

Any electronic device that interfaces with the host running an embedded application need to work to fulfill the end goal

Any electronic device that interfaces with the host running an embedded application need to work hand in hand with it to fulfill the end goal. In some situations, the task of the reader could be to simply send the data over a serial line. In other situations, the task would be to perform operations based on the input given by the embedded host application or hardware.

An example of such a scenario would be when the host expects the reader to detect transponders only when a particular character is transmitted to the reader. Another example would be that the reader would execute a sequence of commands based on a GPIO output initiated by the host. It can be very beneficial if the reader can run a custom protocol under the embedded host.

Can the security algorithm and data integrity check be customized?

Typically, it is desirable to have popular encryption standards such as AES, DES, 3DES, etc. to be part of the reader’s firmware. This would help embedded designers readily take advantage of these encryption methodologies. But there are cases wherein the host system is using a HashMap-based algorithm. In such a scenario the reader should have the capability to implement the algorithm and produce an output that can be correctly processed.

There are scenarios wherein the host system is also expecting CRCs (Cyclic Redundancy Checks) to be part of the data stream to verify the integrity of the data. It is extremely helpful if the reader can run applications and implement custom algorithms so that the host can properly decrypt the data and also verify data integrity.

Does the reader have the ability to control the use of feedback?

One of the most important considerations is having the ability to modify the reader's user feedback or physical behaviour per the customer's needs. Some customers expect the reader to blink a Green LED when an RFID card is presented, and some expect the reader to beep and transition its LED colour state from red to green.

Having the ability to control this basic feedback (and more) or response to an event initiated by the user is of prime importance.

Download PDF version Download PDF version

Author profile

Kiran Vasishta Field Application Engineer, ELATEC USA

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?