How the Door Reader, credential and access control software work

Door access control has become a very essential part of our security structure. The door readers control the electric lock and choose who enters the building.

The access control readers use credentials which can be cards that fit in your wallet, or thick lanyard cards with holes that can be worn around your neck, or keyfobs that apply to your keyring. The latest door readers can also use your smartphone to open the door. The most secure credentials are your biometric attribute. Your face or fingerprint delivers accurate identification of you rather than the credential you carry. This article shows how door access control systems work.


The Door Reader for Door Access

The RFID door readers use credentials that have embedded circuits and an antenna. The reader broadcasts a signal that is received by the credential antenna. The broadcasted electrical signal from the door reader contains enough power to energize the circuit in the credential. When the electric circuit in the credential receives the power it sends back a signal to the access control reader that contains its identification (ID) number.

Card reader concept: How the Card Reader Works

The latest door readers are smart devices that connect to the network and are powered by using Power over Ethernet (PoE). They connect directly to the network and maintain the identification codes for all the people assigned to the system. They can work even if the organization’s network is down and the central management software is unavailable. They can operate by themselves as long as backup power is provided to the network switch that connects and powers (using PoE) all the readers.

The door reader transfers the ID number it receives to the controller portion of the door access control system. The controller compares the ID number to the list in its memory. If the ID is admissible it will unlock the door.

The door reader controls the electric lock on the door. The new readers provide the power to control the lock. They also have sensors to detect if the door is opened and Request to Exit connections to open the door using a button.


Door Reader Credentials for Door Access Control Systems

The credentials come with a unique internal number that identifies the card credential. You can select the type of RFID credential you would like.  For instance, you can have a thin card, thick card or a keyfob as your chosen format. Every credential has a unique number. There are also credentials that use different data formats and frequency between the credential and the door reader. There are Wiegand 26-bit, HID that use 125 KHz frequency, and Smart-cards that use 13.56 MHz frequency.


Hand card door reader

As there are many different formats, It is best to order your credentials from the same vendor as the door reader and to order additional credentials from the same vendor.

This will ensure that you receive the next batch of numbered credentials with unique numbers. The packages of door credentials are determined and sold based on their starting and ending ID number.


Smartphone Bluetooth Credential

The latest readers can also read a unique number delivered by your smartphone. In this respect, an app running on your phone connects to the reader using a Bluetooth connection. Most Bluetooth enabled door readers will need you to enable the app when you are near the door reader.


Biometric Readers and Credentials for Door Access

These special biometric readers are designed to read biometric information rather than a card that you carry. There are fingerprint readers, facial readers, finger vein readers, and other readers that read a characteristic of the person instead of a card that they carry. This is a much more  secure form of access control, but costs more per door.


Door Access Control Management

Modern door access systems use door access management software that runs on your Windows PC or in a cloud server. The door control management system can be controlled by means of your PC or an app on your smartphone. The registration data is held in a database in the computer and this information is broadcast over the network to all the readers on the network.


Door Access Control Management Software

The software keeps the database of all the registered users. It lets new added, deleted or edited. The software associates a person to an assigned credential. Each person is given a credential, and the ID number of the card (credential) is either entered manually or automatically by scanning the credential. Many systems let a picture of the user so that it is easy to confirm the right person has the credential. This is helpful when the system is integrated with an IP camera system. The access control management systems let you to finalize the time and day a person can enter, as well as the door they can use.


the software also lets you assign personal to manage access, and add new people to the list. In some cases, you can add additional information like the department the person is in, and other data that  may be helpful. To boost operating the system, some management systems include maps of the premises that can help you monitor alarm situations. You can also establish alerts such as doors being opened for too long, or even if an unauthorized person tries to open a door.


Back to list