1255:
480:
incrementing from 1. Another organization has a different facility code and their card set also increments from 1. Thus different organizations can have card sets with the same card numbers but since the facility codes differ, the cards only work at one organization. This idea worked early in the technology, but as there is no governing body controlling card numbers, different manufacturers can supply cards with identical facility codes and identical card numbers to different organizations. Thus there may be duplicate cards that allow access to multiple facilities in one area. To counteract this problem some manufacturers have created formats beyond 26-bit
Wiegand that they control and issue to organizations.
211:
encode any format on any track. A mag-stripe card is cheap compared to other card technologies and is easy to program. The magnetic stripe holds more data than a barcode can in the same space. While a mag-stripe is more difficult to generate than a bar code, the technology for reading and encoding data on a mag-stripe is widespread and easy to acquire. Magnetic stripe technology is also susceptible to misreads, card wear, and data corruption. These cards are also susceptible to some forms of skimming where external devices are placed over the reader to intercept the data read.
741:
400:
control systems only read serial numbers of contactless smart cards and do not utilize the available memory. Card memory may be used for storing biometric data (i.e. fingerprint template) of a user. In such case a biometric reader first reads the template on the card and then compares it to the finger (hand, eye, etc.) presented by the user. In this way biometric data of users does not have to be distributed and stored in the memory of controllers or readers, which simplifies the system and reduces memory requirements.
626:
543:
914:
239:
898:
this method is slower, because the reader may have to perform thousands of comparison operations until it finds the match. An important technical characteristic of a 1-to-many reader is the number of comparisons that can be performed in one second, which is considered the maximum time that users can wait at a door without noticing a delay. Currently most 1-to-many readers are capable of performing 2,000–3,000 matching operations per second.
32:
712:
445:
415:
399:
A contactless smart card uses high frequency radio waves (13.56 MHz instead of 125 kHz), which allows the transfer of more data, and communication with several cards at the same time. A contactless card does not have to touch the reader or even be taken out of a wallet or purse. Most access
219:
Smart card readers use an electrical current to read data from embedded circuitry or magnetic features in a card. A contact smart card must physically touch contacts on a reader to connect a circuit between them. A contactless smart card uses radio waves or a magnetic field to transmit information to
897:
In the 1-to-many mode a user presents biometric data such as a fingerprint or retina scan and the reader then compares the live scan to all the templates stored in the memory. This method is preferred by most end-users, because it eliminates the need to carry ID cards or use PINs. On the other hand,
483:
In the 26-bit
Wiegand format, bit 1 is an even parity bit. Bits 2–9 are a facility code. Bits 10–25 are the card number. Bit 26 is an odd parity bit. 1/8/16/1. Other formats have a similar structure of a leading facility code followed by the card number and including parity bits for error checking,
893:
In the 1-to-1 mode a user must first either present an ID card or enter a PIN. The reader then looks up the template of the corresponding user in the database and compares it with the live scan. The 1-to-1 method is considered more secure and is generally faster as the reader needs to perform only
210:
Magnetic stripe technology, usually called mag-stripe, is so named because of the stripe of magnetic oxide tape that is laminated on a card. There are three tracks of data on the magnetic stripe. Typically the data on each of the tracks follows a specific encoding standard, but it is possible to
633:
The earliest punched card readers used pins that would dip into tiny cups of mercury when passing through a punched hole, completing an electrical circuit; in the late 1920s, IBM developed card readers that used metal brushes to make electrical contact with a roller wherever a hole passed between
516:
technology, this card must be swiped through a reader to be read. Unlike the other technologies, the identification media is embedded in the card and not susceptible to wear. This technology once gained popularity because it is difficult to duplicate, creating a high perception of security. This
869:
Biometric templates may be stored in the memory of readers, limiting the number of users by the reader memory size (there are reader models that have been manufactured with a storage capacity of up to 50,000 templates). User templates may also be stored in the memory of the smart card, thereby
479:
A common proximity format is 26-bit
Wiegand. This format uses a facility code, sometimes also called a site code. The facility code is a unique number common to all of the cards in a particular set. The idea is that an organization will have their own facility code and a set of numbered cards
786:
609:
against rows of mechanical control rods to convert the data on the cards into physical positions of the loom's hooks. A hole in the card would allow the rod to pass through and remain unmoved; if there was no hole the rod would be pushed, moving its hook out of position.
1134:
858:. The control panel then checks the permission level of the user and determines whether access should be allowed. The communication between the reader and the control panel is usually transmitted using the industry standard
1072:
894:
one comparison. Most 1-to-1 biometric readers are "dual-technology" readers: they either have a built-in proximity, smart card or keypad reader, or they have an input for connecting an external card reader.
1254:
391:, in which the readers are tampered with during manufacture or in the supply chain before delivery. The rogue devices capture customers' card details before transmitting them to criminals.
622:
in 1890, data was read from punched cards by detecting whether a hole in the card allowed an electrical circuit to connect or an unpunched section of card interrupted that circuit.
1082:
969:
Throughout the 20th century, punched card readers were used to tabulate and process data including census data, financial data, and government contracts.
954:
scheme where card readers are used to allow the card holder to verify the amount of money stored on the card and the details of the last few transactions.
854:
that the template in the memory is compatible with the live scan (the scan belongs to the authorized person), the ID number of that person is sent to a
1058:
Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
524:
Proximity card readers are still referred to as "Wiegand output readers", but no longer use the
Wiegand effect. Proximity technology retains the
152:, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read
254:
to read data from the card. Smart card readers used for banking or identification may be connected to a keyboard to allow verification with a
1398:
870:
removing all limits to the number of system users (finger-only identification is not possible with this technology), or a central
1216:
882:. Server-based systems support a large number of users but are dependent on the reliability of the central server, as well as
1055:
929:
Some banks have issued hand-held smartcard readers to their customers to support different electronic payment applications:
96:
1006:
517:
technology is being replaced by proximity cards, however, because of the limited source of supply, the relatively better
68:
468:. When a card is presented to the reader, the reader's electrical field excites a coil in the card. The coil charges a
409:
862:. The only exception is the intelligent biometric reader, which does not require any panels and directly controls all
1388:
365:
115:
140:
and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including:
75:
850:
stored in memory to the scan obtained during the process of identification. If there is a high enough degree of
255:
165:
53:
19:
This article is about the data input device. For the fortune-telling or divination using a deck of cards, see
759:
that allows physical access through access control points, typically a locked door. They can also be used in
675:
547:
82:
246:
A contact smart card reader is an electronic device that physically connects to an integrated circuit in a
49:
933:
922:
908:
574:(MMC). Most card readers also offer write capability, and together with the card, this can function as a
508:
wires strategically positioned to create a unique pattern that generates the identification number. Like
874:
PC can act as the template host. For systems where a central server is employed, known as "server-based
64:
1244:
1209:
1026:
840:
591:
729:
Card readers are often used to read identification cards for the purposes of physical or electronic
970:
855:
878:", readers first read the biometric data of the user and then forward it to the main computer for
1356:
377:
251:
42:
521:
of proximity readers, and the convenience of the touch-less functionality in proximity readers.
476:. The integrated circuit outputs the card number to the coil, which transmits it to the reader.
137:
847:
423:
1202:
1103:
1036:
974:
964:
373:
578:. Memory card readers can be built in to laptop computers or computer peripherals, or use a
1393:
760:
579:
381:
343:
325:
205:
157:
8:
1132:, James L Pike, "Photoelectric punched card and document reader", issued 1971
1077:
879:
823:
Readers may compare the data collected from the card, or data stored in the reader, to a
740:
567:
388:
220:
a reader remotely (though most readers have a range of 20 in (51 cm) or less).
89:
1323:
1239:
1031:
871:
828:
700:
Simple data, such as an ID number, name, or address, can be encoded onto a card with a
619:
555:
537:
473:
369:
339:
290:
Asynchronous half-duplex block-level transmission protocol, defined in ISO/IEC 7816-3.
161:
973:
was widely used in the United States from 1965 until it was effectively banned by the
1285:
1016:
883:
859:
799:
752:
734:
525:
518:
172:
889:
1-to-1 and 1-to-many are the two possible modes of operation of a biometric reader:
1001:
996:
951:
836:
602:
387:
Smartcard readers have been targeted successfully by criminals in what is termed a
355:
1129:
464:
A reader radiates a 1" to 20" electrical field around itself. Cards use a simple
1362:
764:
509:
335:
188:
715:
The reverse of a South
African Smart ID card, which uses both 1D and 2D barcodes
1339:
1313:
1290:
986:
875:
863:
748:
730:
705:
695:
571:
501:
324:
If the card does not use any standard transmission protocol, but uses a custom/
176:
141:
629:
An IBM 80-column punched card of the type most widely used in the 20th century
625:
1382:
832:
679:
667:
643:
606:
542:
505:
484:
such as the 1/12/12/1 format used by some
American access control companies.
351:
315:
1403:
1296:
1269:
1173:
1021:
563:
279:
184:
153:
149:
133:
913:
1280:
1225:
1148:
1011:
851:
559:
1345:
1307:
991:
772:
756:
671:
465:
247:
229:
20:
711:
278:
Asynchronous half-duplex byte-level transmission protocol, defined in
238:
1275:
947:
824:
763:
systems to control access to data. An access control reader can be a
575:
469:
180:
490:
1/12/12/1 gives a facility code limit of 4095 and 4095 card number.
31:
1367:
941:
918:
768:
647:
487:
1/8/16/1 gives as facility code limit of 255 and 65535 card number
145:
1333:
1327:
1318:
701:
683:
513:
493:
Wiegand was also stretched to 34 bits, 56 bits and many others.
1302:
1194:
1073:"Chip and pin scam 'has netted millions from British shoppers'"
785:
653:
A photoelectric punched card reader patent was issued in 1971.
444:
361:
354:
when used with PC/SC-compliant operating systems, because the
328:
protocol, it has the communication protocol designation T=14.
250:, supplies the circuit in the card with electricity, and uses
332:
427:
1351:
937:
682:
and store that data in a contact database or 'electronic
528:
so that the new readers are compatible with old systems.
233:
504:
card technology is a patented technology using embedded
414:
940:
banking cards to authenticate online transactions as a
744:
a contactless smart card reader used for access control
650:
is an example of an early optical punched card reader.
546:
A USB card reader like this one will typically use the
724:
846:A card reader with a biometric system compares the
601:The earliest example of a punched card reader, the
582:interface to transfer data to and from a computer.
56:. Unsourced material may be challenged and removed.
613:
394:
384:to work without knowledge of the reader details.
171:Card readers are used for applications including
1380:
637:
661:
1210:
656:
410:Radio-frequency identification § Readers
223:
1128:
1070:
314:APDU transmission via contactless interface
1104:"Early Punched Card Equipment, 1880 - 1951"
1217:
1203:
817:fingerprint identification, access control
443:
432:
418:Electronic key for RFID based lock system
116:Learn how and when to remove this message
912:
739:
710:
624:
558:is a device for accessing the data on a
541:
413:
380:tokens such as smart cards. This allows
237:
199:
1108:Engineering and Technology History Wiki
704:and read from the card with an optical
642:By 1965, punched cards were read using
596:
585:
496:
346:devices with the specific device class
338:specifications define a new smart card
1381:
531:
350:. Readers with this class do not need
1198:
666:A business card reader is a portable
214:
678:to detect specific data fields on a
403:
54:adding citations to reliable sources
25:
1007:Glossary of computer hardware terms
136:that reads data from a card-shaped
13:
1399:Solid-state computer storage media
958:
689:
14:
1415:
771:reader, a proximity reader, or a
725:Identification and access control
372:-independent, defining a generic
168:chip, or another storage medium.
1253:
1224:
784:
358:supplies the driver by default.
30:
614:Electrical punched card readers
41:needs additional citations for
1299:(MS, MS-PRO, MS-PRO HG, MS-XC)
1166:
1141:
1122:
1096:
1064:
1049:
395:Contactless smart card readers
256:personal identification number
1:
1042:
676:optical character recognition
548:USB mass storage device class
194:
638:Optical punched card readers
449:Proximity reader with keypad
342:. This framework works with
7:
1071:Henry Samuel (2008-10-10).
980:
934:Chip Authentication Program
923:Chip Authentication Program
909:Chip Authentication Program
662:Business card text scanners
10:
1420:
1336:(PCMCIA, CardBus, CardBay)
1245:Comparison of memory cards
962:
906:
902:
693:
657:Other optical card readers
589:
535:
421:
407:
227:
224:Contact smart card readers
203:
18:
1262:
1251:
1232:
1027:Punched card input/output
839:, Voice Recognition, and
813:
805:
795:
783:
751:card readers are used in
592:Punched card input/output
454:
442:
306:Reserved for future use.
298:Reserved for future use.
1389:Computer storage devices
1149:"Reading Business Cards"
733:or to read data from an
262:Communication protocols
252:communications protocols
1357:Universal Flash Storage
719:
156:embedded with either a
1174:"The IBM punched card"
926:
745:
716:
630:
551:
472:and in turn powers an
433:Proximity card readers
424:Contactless smart card
419:
243:
1037:Unit record equipment
975:Help America Vote Act
965:Unit record equipment
916:
790:IP fingerprint reader
743:
714:
628:
605:, physically pressed
545:
526:Wiegand upstream data
417:
241:
200:Magnetic card readers
1056:ISO/IEC 7816-3:2006
761:information security
597:The Jacquard machine
586:Punched card readers
497:Wiegand card readers
206:Magnetic stripe card
50:improve this article
971:Punched card voting
884:communication lines
780:
618:Beginning with the
532:Memory card readers
439:
389:supply chain attack
263:
144:of printed text or
1342:(SDSC, SDHC, SDXC)
1240:Memory card reader
1032:Tabulating machine
927:
841:facial recognition
778:
755:systems to read a
746:
717:
631:
620:Tabulating machine
556:memory card reader
552:
538:Memory card reader
474:integrated circuit
437:
420:
261:
244:
215:Smart card readers
1376:
1375:
1017:Physical security
860:Wiegand interface
821:
820:
800:Internet Protocol
779:IP access control
753:physical security
519:tamper resistance
462:
461:
404:RFID card readers
322:
321:
242:Smart card reader
126:
125:
118:
100:
16:Data input device
1411:
1257:
1219:
1212:
1205:
1196:
1195:
1189:
1188:
1186:
1184:
1170:
1164:
1163:
1161:
1159:
1145:
1139:
1138:
1137:
1133:
1126:
1120:
1119:
1117:
1115:
1110:. 9 January 2015
1100:
1094:
1093:
1091:
1090:
1081:. Archived from
1068:
1062:
1053:
1002:Jacquard machine
997:Iris recognition
952:electronic purse
827:identification:
788:
781:
777:
603:Jacquard machine
447:
440:
436:
356:operating system
349:
264:
260:
142:optical scanning
121:
114:
110:
107:
101:
99:
58:
34:
26:
1419:
1418:
1414:
1413:
1412:
1410:
1409:
1408:
1379:
1378:
1377:
1372:
1258:
1249:
1228:
1223:
1193:
1192:
1182:
1180:
1172:
1171:
1167:
1157:
1155:
1147:
1146:
1142:
1135:
1127:
1123:
1113:
1111:
1102:
1101:
1097:
1088:
1086:
1069:
1065:
1054:
1050:
1045:
983:
967:
961:
959:Data tabulation
944:countermeasure.
911:
905:
809:10000 templates
791:
765:magnetic stripe
727:
722:
698:
692:
690:Barcode readers
664:
659:
640:
616:
599:
594:
588:
540:
534:
510:magnetic stripe
499:
450:
435:
430:
412:
406:
397:
368:designed to be
347:
236:
226:
217:
208:
202:
197:
189:data processing
122:
111:
105:
102:
59:
57:
47:
35:
24:
17:
12:
11:
5:
1417:
1407:
1406:
1401:
1396:
1391:
1374:
1373:
1371:
1370:
1365:
1360:
1354:
1349:
1343:
1340:Secure Digital
1337:
1331:
1321:
1316:
1311:
1305:
1300:
1294:
1291:MultiMediaCard
1288:
1283:
1278:
1273:
1266:
1264:
1260:
1259:
1252:
1250:
1248:
1247:
1242:
1236:
1234:
1230:
1229:
1222:
1221:
1214:
1207:
1199:
1191:
1190:
1165:
1140:
1121:
1095:
1063:
1061:, clause 8.2.3
1047:
1046:
1044:
1041:
1040:
1039:
1034:
1029:
1024:
1019:
1014:
1009:
1004:
999:
994:
989:
987:Access control
982:
979:
963:Main article:
960:
957:
956:
955:
945:
907:Main article:
904:
901:
900:
899:
895:
819:
818:
815:
811:
810:
807:
803:
802:
797:
793:
792:
789:
749:Access control
731:access control
726:
723:
721:
718:
706:barcode reader
696:Barcode reader
694:Main article:
691:
688:
663:
660:
658:
655:
639:
636:
615:
612:
598:
595:
590:Main article:
587:
584:
572:MultiMediaCard
568:Secure Digital
536:Main article:
533:
530:
498:
495:
460:
459:
458:access control
456:
452:
451:
448:
438:Access control
434:
431:
408:Main article:
405:
402:
396:
393:
352:device drivers
320:
319:
312:
308:
307:
304:
300:
299:
296:
292:
291:
288:
284:
283:
276:
272:
271:
268:
225:
222:
216:
213:
201:
198:
196:
193:
177:access control
173:identification
158:magnetic strip
138:storage medium
124:
123:
38:
36:
29:
15:
9:
6:
4:
3:
2:
1416:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1386:
1384:
1369:
1366:
1364:
1361:
1358:
1355:
1353:
1350:
1347:
1344:
1341:
1338:
1335:
1332:
1329:
1325:
1322:
1320:
1317:
1315:
1312:
1309:
1306:
1304:
1301:
1298:
1295:
1292:
1289:
1287:
1284:
1282:
1279:
1277:
1274:
1271:
1268:
1267:
1265:
1261:
1256:
1246:
1243:
1241:
1238:
1237:
1235:
1233:Main articles
1231:
1227:
1220:
1215:
1213:
1208:
1206:
1201:
1200:
1197:
1179:
1175:
1169:
1154:
1153:How OCR Works
1150:
1144:
1131:
1130:US US3553435A
1125:
1109:
1105:
1099:
1085:on 2008-10-11
1084:
1080:
1079:
1078:The Telegraph
1074:
1067:
1060:
1059:
1052:
1048:
1038:
1035:
1033:
1030:
1028:
1025:
1023:
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
984:
978:
976:
972:
966:
953:
949:
946:
943:
939:
935:
932:
931:
930:
924:
920:
915:
910:
896:
892:
891:
890:
887:
885:
881:
877:
873:
867:
865:
864:door hardware
861:
857:
856:control panel
853:
849:
844:
842:
838:
834:
833:hand geometry
830:
826:
816:
812:
808:
804:
801:
798:
794:
787:
782:
776:
774:
770:
766:
762:
758:
754:
750:
742:
738:
736:
735:identity card
732:
713:
709:
707:
703:
697:
687:
685:
681:
680:business card
677:
673:
669:
668:image scanner
654:
651:
649:
646:sensors. The
645:
644:photoelectric
635:
627:
623:
621:
611:
608:
607:punched cards
604:
593:
583:
581:
577:
573:
569:
565:
561:
557:
549:
544:
539:
529:
527:
522:
520:
515:
511:
507:
506:ferromagnetic
503:
494:
491:
488:
485:
481:
477:
475:
471:
467:
457:
453:
446:
441:
429:
425:
416:
411:
401:
392:
390:
385:
383:
379:
378:cryptographic
375:
371:
367:
363:
359:
357:
353:
345:
341:
337:
334:
329:
327:
317:
316:ISO/IEC 14443
313:
310:
309:
305:
302:
301:
297:
294:
293:
289:
286:
285:
281:
277:
274:
273:
269:
266:
265:
259:
257:
253:
249:
240:
235:
231:
221:
212:
207:
192:
190:
186:
182:
178:
174:
169:
167:
163:
162:computer chip
159:
155:
154:plastic cards
151:
150:punched cards
147:
143:
139:
135:
131:
120:
117:
109:
98:
95:
91:
88:
84:
81:
77:
74:
70:
67: –
66:
65:"Card reader"
62:
61:Find sources:
55:
51:
45:
44:
39:This article
37:
33:
28:
27:
22:
1297:Memory Stick
1281:Express Card
1270:CompactFlash
1226:Memory cards
1181:. Retrieved
1178:IBM Heritage
1177:
1168:
1156:. Retrieved
1152:
1143:
1124:
1112:. Retrieved
1107:
1098:
1087:. Retrieved
1083:the original
1076:
1066:
1057:
1051:
1022:Punched card
968:
950:is a German
928:
888:
876:verification
868:
845:
822:
747:
728:
699:
665:
652:
641:
632:
617:
600:
564:CompactFlash
553:
523:
500:
492:
489:
486:
482:
478:
463:
398:
386:
382:applications
360:
330:
323:
311:Contactless
280:ISO/IEC 7816
270:Description
245:
218:
209:
185:data storage
170:
148:or holes on
134:input device
129:
127:
112:
106:October 2010
103:
93:
86:
79:
72:
60:
48:Please help
43:verification
40:
1394:Smart cards
1272:(CF, CFast)
1012:Memory card
936:(CAP) uses
852:probability
829:fingerprint
767:reader, a
560:memory card
331:The latest
326:proprietary
130:card reader
1383:Categories
1363:xD-Picture
1346:SmartMedia
1308:Microdrive
1183:25 January
1158:25 January
1114:25 January
1089:2008-10-13
1043:References
992:Credential
921:PINsentry
880:processing
796:Media type
773:smart card
757:credential
674:that uses
672:mobile app
670:device or
562:such as a
466:LC circuit
422:See also:
248:smart card
230:Smart card
228:See also:
204:See also:
195:Mechanisms
132:is a data
76:newspapers
21:Cartomancy
1276:CFexpress
977:of 2002.
948:Geldkarte
825:biometric
576:pen drive
470:capacitor
374:interface
340:framework
258:(PIN).
1314:MiniCard
981:See also
942:phishing
919:Barclays
848:template
806:Capacity
775:reader.
769:bar code
648:IBM 2501
570:(SD) or
370:platform
146:barcodes
1334:PC Card
1328:MicroP2
1319:NT Card
903:Banking
702:barcode
684:rolodex
514:barcode
502:Wiegand
362:PKCS#11
181:banking
90:scholar
1303:miCard
1136:
925:device
872:server
634:them.
566:(CF),
364:is an
187:, and
92:
85:
78:
71:
63:
1359:(UFS)
1293:(MMC)
1286:JEIDA
1263:Types
814:Usage
455:Usage
333:PC/SC
267:Name
97:JSTOR
83:books
1348:(SM)
1310:(MD)
1185:2024
1160:2024
1116:2024
917:The
837:iris
720:Uses
686:'.
428:RFID
426:and
348:0x0B
336:CCID
303:T=3
295:T=2
287:T=1
275:T=0
232:and
179:and
166:RFID
69:news
1404:USB
1368:XQD
1352:SxS
938:EMV
580:USB
512:or
376:to
366:API
344:USB
282:-3
234:EMV
52:by
1385::
1324:P2
1176:.
1151:.
1106:.
1075:.
886:.
866:.
843:.
835:,
831:,
737:.
708:.
554:A
318:.
191:.
183:,
175:,
164:,
160:,
128:A
1330:)
1326:(
1218:e
1211:t
1204:v
1187:.
1162:.
1118:.
1092:.
550:.
119:)
113:(
108:)
104:(
94:·
87:·
80:·
73:·
46:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.