Today, RFID readers can be found in numerous devices requiring user authentication, authorisation and access control, from doors to multi-function printers to point of sale terminals to computers and more. RFID is a simple, secure and convenient access control solution for end users and original equipment manufacturers. RFID readers/writers come with a broad range of form factors, capabilities and configurations.

Choosing the right RFID reader

When choosing a reader to embed into a system or device, it is important to make sure it fully meets all of your design specifications. You also need to make sure it will continue to meet your needs for years to come, as device specification and end user requirements change.

Here are eleven considerations – and some specific questions to ask – for product managers, embedded system engineers and solution architects, when choosing an RFID design-in module solution:

Transponder Technologies

  • Does the reader support all of the card technologies used by your customers?
  • How much diversity exists in card technologies used by your client base?
  • How many clients need to support multiple card technologies across their organisations?

Mobile Device Access

  • Does the reader support smartphone authentication for users wanting mobile device access?
  • Do you anticipate your client base shifting to smartphone authentication in the future?

Adding Transponder Technologies

  • Do you anticipate needing to add new transponder technologies in coming years?
  • Does the reader support addition of new transponder technologies after installation?

Post-installation Reconfiguration

  • How easy is it to reconfigure the reader after installation?
  • Does the reader support contactless upgrades and configuration in installed devices?
  • Does the reader support remote configuration?

Customisation

  • Does the reader have reconfiguration flexibility for integration?
  • How does the reader integrate with hardware systems or back-end software?
  • Can the communication or security protocols be customised?
  • Does the reader have the ability to control user feedback (e.g., lights or sounds)?

Hardware Communication Interface

  • Is the communication interface for the reader compatible with the requirements of your system?
  • How much flexibility do you have in choosing a hardware interface?

Form Factor

  • Does the reader fit into the form factor of your device?
  • Will the size or form factor of the reader require design alternations to accommodate?

Internal vs External Antenna

  • Do you intend to develop your own external antenna with an RFID engine/module or do you need a finished product with embedded antennas?
  • When do you choose a device that has integrated antennas over developing an external custom RF antenna?
  • How can RFID modules without antennas be integrated?

Operating Power and Consumption Requirements

  • Does the reader meet voltage requirements for your device?
  • How much power does the reader consume when in use?
  • How much power does the reader consume when not active?

Security

  • Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms?
  • Do you require encrypted data exchange? If so, where and can the card reader support this?
  • Does your application require MUTUAL Authentication with Secure Access Modules (SAM) and RFID Media? If so, does the reader support this?
  • Does the card reader have communication interfaces other than Wiegand, such as RS485 or RS232?
  • Do you require tamper detection technologies? If so, can the reader meet this requirement?
  • Do you require the reader's configuration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement?

Certifications and Compliance

  • What kinds of certifications and standards must your device meet to sell into your target markets?
  • Does the reader meet all certification and compliance requirements?
Download PDF version Download PDF version

Author profile

Kiran Vasishta Field Application Engineer, ELATEC USA

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?