Today, RFID readers can be found in numerous devices requiring user authentication, authorisation and access control, from doors to multi-function printers to point of sale terminals to computers and more. RFID is a simple, secure and convenient access control solution for end users and original equipment manufacturers. RFID readers/writers come with a broad range of form factors, capabilities and configurations.

Choosing the right RFID reader

When choosing a reader to embed into a system or device, it is important to make sure it fully meets all of your design specifications. You also need to make sure it will continue to meet your needs for years to come, as device specification and end user requirements change.

Here are eleven considerations – and some specific questions to ask – for product managers, embedded system engineers and solution architects, when choosing an RFID design-in module solution:

Transponder Technologies

  • Does the reader support all of the card technologies used by your customers?
  • How much diversity exists in card technologies used by your client base?
  • How many clients need to support multiple card technologies across their organisations?

Mobile Device Access

  • Does the reader support smartphone authentication for users wanting mobile device access?
  • Do you anticipate your client base shifting to smartphone authentication in the future?

Adding Transponder Technologies

  • Do you anticipate needing to add new transponder technologies in coming years?
  • Does the reader support addition of new transponder technologies after installation?

Post-installation Reconfiguration

  • How easy is it to reconfigure the reader after installation?
  • Does the reader support contactless upgrades and configuration in installed devices?
  • Does the reader support remote configuration?

Customisation

  • Does the reader have reconfiguration flexibility for integration?
  • How does the reader integrate with hardware systems or back-end software?
  • Can the communication or security protocols be customised?
  • Does the reader have the ability to control user feedback (e.g., lights or sounds)?

Hardware Communication Interface

  • Is the communication interface for the reader compatible with the requirements of your system?
  • How much flexibility do you have in choosing a hardware interface?

Form Factor

  • Does the reader fit into the form factor of your device?
  • Will the size or form factor of the reader require design alternations to accommodate?

Internal vs External Antenna

  • Do you intend to develop your own external antenna with an RFID engine/module or do you need a finished product with embedded antennas?
  • When do you choose a device that has integrated antennas over developing an external custom RF antenna?
  • How can RFID modules without antennas be integrated?

Operating Power and Consumption Requirements

  • Does the reader meet voltage requirements for your device?
  • How much power does the reader consume when in use?
  • How much power does the reader consume when not active?

Security

  • Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms?
  • Do you require encrypted data exchange? If so, where and can the card reader support this?
  • Does your application require MUTUAL Authentication with Secure Access Modules (SAM) and RFID Media? If so, does the reader support this?
  • Does the card reader have communication interfaces other than Wiegand, such as RS485 or RS232?
  • Do you require tamper detection technologies? If so, can the reader meet this requirement?
  • Do you require the reader's configuration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement?

Certifications and Compliance

  • What kinds of certifications and standards must your device meet to sell into your target markets?
  • Does the reader meet all certification and compliance requirements?
Download PDF version Download PDF version

Author profile

Kiran Vasishta Field Application Engineer, ELATEC USA

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?