Knowledge

Card reader

Source 📝

1266: 491:
incrementing from 1. Another organization has a different facility code and their card set also increments from 1. Thus different organizations can have card sets with the same card numbers but since the facility codes differ, the cards only work at one organization. This idea worked early in the technology, but as there is no governing body controlling card numbers, different manufacturers can supply cards with identical facility codes and identical card numbers to different organizations. Thus there may be duplicate cards that allow access to multiple facilities in one area. To counteract this problem some manufacturers have created formats beyond 26-bit Wiegand that they control and issue to organizations.
222:
encode any format on any track. A mag-stripe card is cheap compared to other card technologies and is easy to program. The magnetic stripe holds more data than a barcode can in the same space. While a mag-stripe is more difficult to generate than a bar code, the technology for reading and encoding data on a mag-stripe is widespread and easy to acquire. Magnetic stripe technology is also susceptible to misreads, card wear, and data corruption. These cards are also susceptible to some forms of skimming where external devices are placed over the reader to intercept the data read.
752: 411:
control systems only read serial numbers of contactless smart cards and do not utilize the available memory. Card memory may be used for storing biometric data (i.e. fingerprint template) of a user. In such case a biometric reader first reads the template on the card and then compares it to the finger (hand, eye, etc.) presented by the user. In this way biometric data of users does not have to be distributed and stored in the memory of controllers or readers, which simplifies the system and reduces memory requirements.
637: 554: 925: 250: 909:
this method is slower, because the reader may have to perform thousands of comparison operations until it finds the match. An important technical characteristic of a 1-to-many reader is the number of comparisons that can be performed in one second, which is considered the maximum time that users can wait at a door without noticing a delay. Currently most 1-to-many readers are capable of performing 2,000–3,000 matching operations per second.
43: 723: 456: 426: 410:
A contactless smart card uses high frequency radio waves (13.56 MHz instead of 125 kHz), which allows the transfer of more data, and communication with several cards at the same time. A contactless card does not have to touch the reader or even be taken out of a wallet or purse. Most access
230:
Smart card readers use an electrical current to read data from embedded circuitry or magnetic features in a card. A contact smart card must physically touch contacts on a reader to connect a circuit between them. A contactless smart card uses radio waves or a magnetic field to transmit information to
908:
In the 1-to-many mode a user presents biometric data such as a fingerprint or retina scan and the reader then compares the live scan to all the templates stored in the memory. This method is preferred by most end-users, because it eliminates the need to carry ID cards or use PINs. On the other hand,
494:
In the 26-bit Wiegand format, bit 1 is an even parity bit. Bits 2–9 are a facility code. Bits 10–25 are the card number. Bit 26 is an odd parity bit. 1/8/16/1. Other formats have a similar structure of a leading facility code followed by the card number and including parity bits for error checking,
904:
In the 1-to-1 mode a user must first either present an ID card or enter a PIN. The reader then looks up the template of the corresponding user in the database and compares it with the live scan. The 1-to-1 method is considered more secure and is generally faster as the reader needs to perform only
221:
Magnetic stripe technology, usually called mag-stripe, is so named because of the stripe of magnetic oxide tape that is laminated on a card. There are three tracks of data on the magnetic stripe. Typically the data on each of the tracks follows a specific encoding standard, but it is possible to
644:
The earliest punched card readers used pins that would dip into tiny cups of mercury when passing through a punched hole, completing an electrical circuit; in the late 1920s, IBM developed card readers that used metal brushes to make electrical contact with a roller wherever a hole passed between
527:
technology, this card must be swiped through a reader to be read. Unlike the other technologies, the identification media is embedded in the card and not susceptible to wear. This technology once gained popularity because it is difficult to duplicate, creating a high perception of security. This
880:
Biometric templates may be stored in the memory of readers, limiting the number of users by the reader memory size (there are reader models that have been manufactured with a storage capacity of up to 50,000 templates). User templates may also be stored in the memory of the smart card, thereby
490:
A common proximity format is 26-bit Wiegand. This format uses a facility code, sometimes also called a site code. The facility code is a unique number common to all of the cards in a particular set. The idea is that an organization will have their own facility code and a set of numbered cards
797: 620:
against rows of mechanical control rods to convert the data on the cards into physical positions of the loom's hooks. A hole in the card would allow the rod to pass through and remain unmoved; if there was no hole the rod would be pushed, moving its hook out of position.
1145: 869:. The control panel then checks the permission level of the user and determines whether access should be allowed. The communication between the reader and the control panel is usually transmitted using the industry standard 1083: 905:
one comparison. Most 1-to-1 biometric readers are "dual-technology" readers: they either have a built-in proximity, smart card or keypad reader, or they have an input for connecting an external card reader.
1265: 402:, in which the readers are tampered with during manufacture or in the supply chain before delivery. The rogue devices capture customers' card details before transmitting them to criminals. 633:
in 1890, data was read from punched cards by detecting whether a hole in the card allowed an electrical circuit to connect or an unpunched section of card interrupted that circuit.
1093: 980:
Throughout the 20th century, punched card readers were used to tabulate and process data including census data, financial data, and government contracts.
965:
scheme where card readers are used to allow the card holder to verify the amount of money stored on the card and the details of the last few transactions.
865:
that the template in the memory is compatible with the live scan (the scan belongs to the authorized person), the ID number of that person is sent to a
1069:
Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
535:
Proximity card readers are still referred to as "Wiegand output readers", but no longer use the Wiegand effect. Proximity technology retains the
163:, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read 265:
to read data from the card. Smart card readers used for banking or identification may be connected to a keyboard to allow verification with a
1409: 881:
removing all limits to the number of system users (finger-only identification is not possible with this technology), or a central
1227: 893:. Server-based systems support a large number of users but are dependent on the reliability of the central server, as well as 1066: 940:
Some banks have issued hand-held smartcard readers to their customers to support different electronic payment applications:
107: 1017: 528:
technology is being replaced by proximity cards, however, because of the limited source of supply, the relatively better
79: 479:. When a card is presented to the reader, the reader's electrical field excites a coil in the card. The coil charges a 420: 17: 873:. The only exception is the intelligent biometric reader, which does not require any panels and directly controls all 1399: 376: 126: 151:
and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including:
86: 861:
stored in memory to the scan obtained during the process of identification. If there is a high enough degree of
266: 176: 64: 30:
This article is about the data input device. For the fortune-telling or divination using a deck of cards, see
770:
that allows physical access through access control points, typically a locked door. They can also be used in
686: 558: 93: 257:
A contact smart card reader is an electronic device that physically connects to an integrated circuit in a
60: 944: 933: 919: 585:(MMC). Most card readers also offer write capability, and together with the card, this can function as a 519:
wires strategically positioned to create a unique pattern that generates the identification number. Like
885:
PC can act as the template host. For systems where a central server is employed, known as "server-based
75: 1255: 1220: 1037: 851: 602: 740:
Card readers are often used to read identification cards for the purposes of physical or electronic
981: 866: 889:", readers first read the biometric data of the user and then forward it to the main computer for 1367: 388: 262: 53: 532:
of proximity readers, and the convenience of the touch-less functionality in proximity readers.
487:. The integrated circuit outputs the card number to the coil, which transmits it to the reader. 148: 858: 434: 1213: 1114: 1047: 985: 975: 384: 589:. Memory card readers can be built in to laptop computers or computer peripherals, or use a 1404: 771: 590: 392: 354: 336: 216: 168: 8: 1143:, James L Pike, "Photoelectric punched card and document reader", issued 1971 1088: 890: 834:
Readers may compare the data collected from the card, or data stored in the reader, to a
751: 578: 399: 231:
a reader remotely (though most readers have a range of 20 in (51 cm) or less).
100: 1334: 1250: 1042: 882: 839: 711:
Simple data, such as an ID number, name, or address, can be encoded onto a card with a
630: 566: 548: 484: 380: 350: 301:
Asynchronous half-duplex block-level transmission protocol, defined in ISO/IEC 7816-3.
172: 984:
was widely used in the United States from 1965 until it was effectively banned by the
1296: 1027: 894: 870: 810: 763: 745: 536: 529: 183: 900:
1-to-1 and 1-to-many are the two possible modes of operation of a biometric reader:
1012: 1007: 962: 847: 613: 398:
Smartcard readers have been targeted successfully by criminals in what is termed a
366: 1140: 475:
A reader radiates a 1" to 20" electrical field around itself. Cards use a simple
1373: 775: 520: 346: 199: 726:
The reverse of a South African Smart ID card, which uses both 1D and 2D barcodes
1350: 1324: 1301: 997: 886: 874: 759: 741: 716: 706: 582: 512: 335:
If the card does not use any standard transmission protocol, but uses a custom/
187: 152: 640:
An IBM 80-column punched card of the type most widely used in the 20th century
636: 1393: 843: 690: 678: 654: 617: 553: 516: 495:
such as the 1/12/12/1 format used by some American access control companies.
362: 326: 1414: 1307: 1280: 1184: 1032: 574: 290: 195: 164: 160: 144: 924: 1291: 1236: 1159: 1022: 862: 570: 1356: 1318: 1002: 783: 767: 682: 476: 258: 240: 31: 722: 289:
Asynchronous half-duplex byte-level transmission protocol, defined in
249: 1286: 958: 835: 774:
systems to control access to data. An access control reader can be a
586: 480: 191: 501:
1/12/12/1 gives a facility code limit of 4095 and 4095 card number.
42: 1378: 952: 929: 779: 658: 498:
1/8/16/1 gives as facility code limit of 255 and 65535 card number
156: 1344: 1338: 1329: 712: 694: 524: 504:
Wiegand was also stretched to 34 bits, 56 bits and many others.
1313: 1205: 1084:"Chip and pin scam 'has netted millions from British shoppers'" 796: 664:
A photoelectric punched card reader patent was issued in 1971.
455: 372: 365:
when used with PC/SC-compliant operating systems, because the
339:
protocol, it has the communication protocol designation T=14.
261:, supplies the circuit in the card with electricity, and uses 343: 438: 1362: 948: 693:
and store that data in a contact database or 'electronic
539:
so that the new readers are compatible with old systems.
244: 515:
card technology is a patented technology using embedded
425: 951:
banking cards to authenticate online transactions as a
755:
a contactless smart card reader used for access control
661:
is an example of an early optical punched card reader.
557:
A USB card reader like this one will typically use the
735: 857:A card reader with a biometric system compares the 612:The earliest example of a punched card reader, the 593:interface to transfer data to and from a computer. 67:. Unsourced material may be challenged and removed. 624: 405: 395:to work without knowledge of the reader details. 182:Card readers are used for applications including 1391: 648: 672: 1221: 667: 421:Radio-frequency identification § Readers 234: 1139: 1081: 325:APDU transmission via contactless interface 1115:"Early Punched Card Equipment, 1880 - 1951" 1228: 1214: 828:fingerprint identification, access control 454: 443: 429:Electronic key for RFID based lock system 127:Learn how and when to remove this message 923: 750: 721: 635: 569:is a device for accessing the data on a 552: 424: 391:tokens such as smart cards. This allows 248: 210: 1119:Engineering and Technology History Wiki 715:and read from the card with an optical 653:By 1965, punched cards were read using 607: 596: 507: 357:devices with the specific device class 349:specifications define a new smart card 14: 1392: 542: 361:. Readers with this class do not need 1209: 677:A business card reader is a portable 225: 689:to detect specific data fields on a 414: 65:adding citations to reliable sources 36: 1018:Glossary of computer hardware terms 147:that reads data from a card-shaped 24: 1410:Solid-state computer storage media 969: 700: 25: 1426: 782:reader, a proximity reader, or a 736:Identification and access control 383:-independent, defining a generic 179:chip, or another storage medium. 1264: 1235: 795: 369:supplies the driver by default. 41: 625:Electrical punched card readers 52:needs additional citations for 1310:(MS, MS-PRO, MS-PRO HG, MS-XC) 1177: 1152: 1133: 1107: 1075: 1060: 406:Contactless smart card readers 267:personal identification number 13: 1: 1053: 687:optical character recognition 559:USB mass storage device class 205: 649:Optical punched card readers 460:Proximity reader with keypad 353:. This framework works with 7: 1082:Henry Samuel (2008-10-10). 991: 945:Chip Authentication Program 934:Chip Authentication Program 920:Chip Authentication Program 673:Business card text scanners 10: 1431: 1347:(PCMCIA, CardBus, CardBay) 1256:Comparison of memory cards 973: 917: 913: 704: 668:Other optical card readers 600: 546: 432: 418: 238: 235:Contact smart card readers 214: 29: 1273: 1262: 1243: 1038:Punched card input/output 850:, Voice Recognition, and 824: 816: 806: 794: 762:card readers are used in 603:Punched card input/output 465: 453: 317:Reserved for future use. 309:Reserved for future use. 1400:Computer storage devices 1160:"Reading Business Cards" 744:or to read data from an 273:Communication protocols 263:communications protocols 1368:Universal Flash Storage 730: 167:embedded with either a 1185:"The IBM punched card" 937: 756: 727: 641: 562: 483:and in turn powers an 444:Proximity card readers 435:Contactless smart card 430: 254: 1048:Unit record equipment 986:Help America Vote Act 976:Unit record equipment 927: 801:IP fingerprint reader 754: 725: 639: 616:, physically pressed 556: 537:Wiegand upstream data 428: 252: 211:Magnetic card readers 1067:ISO/IEC 7816-3:2006 772:information security 608:The Jacquard machine 597:Punched card readers 508:Wiegand card readers 217:Magnetic stripe card 61:improve this article 982:Punched card voting 895:communication lines 791: 629:Beginning with the 543:Memory card readers 450: 400:supply chain attack 274: 155:of printed text or 1353:(SDSC, SDHC, SDXC) 1251:Memory card reader 1043:Tabulating machine 938: 852:facial recognition 789: 766:systems to read a 757: 728: 642: 631:Tabulating machine 567:memory card reader 563: 549:Memory card reader 485:integrated circuit 448: 431: 272: 255: 226:Smart card readers 18:Credit-card reader 1387: 1386: 1028:Physical security 871:Wiegand interface 832: 831: 811:Internet Protocol 790:IP access control 764:physical security 530:tamper resistance 473: 472: 415:RFID card readers 333: 332: 253:Smart card reader 137: 136: 129: 111: 27:Data input device 16:(Redirected from 1422: 1268: 1230: 1223: 1216: 1207: 1206: 1200: 1199: 1197: 1195: 1181: 1175: 1174: 1172: 1170: 1156: 1150: 1149: 1148: 1144: 1137: 1131: 1130: 1128: 1126: 1121:. 9 January 2015 1111: 1105: 1104: 1102: 1101: 1092:. Archived from 1079: 1073: 1064: 1013:Jacquard machine 1008:Iris recognition 963:electronic purse 838:identification: 799: 792: 788: 614:Jacquard machine 458: 451: 447: 367:operating system 360: 275: 271: 153:optical scanning 132: 125: 121: 118: 112: 110: 69: 45: 37: 21: 1430: 1429: 1425: 1424: 1423: 1421: 1420: 1419: 1390: 1389: 1388: 1383: 1269: 1260: 1239: 1234: 1204: 1203: 1193: 1191: 1183: 1182: 1178: 1168: 1166: 1158: 1157: 1153: 1146: 1138: 1134: 1124: 1122: 1113: 1112: 1108: 1099: 1097: 1080: 1076: 1065: 1061: 1056: 994: 978: 972: 970:Data tabulation 955:countermeasure. 922: 916: 820:10000 templates 802: 776:magnetic stripe 738: 733: 709: 703: 701:Barcode readers 675: 670: 651: 627: 610: 605: 599: 551: 545: 521:magnetic stripe 510: 461: 446: 441: 423: 417: 408: 379:designed to be 358: 247: 237: 228: 219: 213: 208: 200:data processing 133: 122: 116: 113: 70: 68: 58: 46: 35: 28: 23: 22: 15: 12: 11: 5: 1428: 1418: 1417: 1412: 1407: 1402: 1385: 1384: 1382: 1381: 1376: 1371: 1365: 1360: 1354: 1351:Secure Digital 1348: 1342: 1332: 1327: 1322: 1316: 1311: 1305: 1302:MultiMediaCard 1299: 1294: 1289: 1284: 1277: 1275: 1271: 1270: 1263: 1261: 1259: 1258: 1253: 1247: 1245: 1241: 1240: 1233: 1232: 1225: 1218: 1210: 1202: 1201: 1176: 1151: 1132: 1106: 1074: 1072:, clause 8.2.3 1058: 1057: 1055: 1052: 1051: 1050: 1045: 1040: 1035: 1030: 1025: 1020: 1015: 1010: 1005: 1000: 998:Access control 993: 990: 974:Main article: 971: 968: 967: 966: 956: 918:Main article: 915: 912: 911: 910: 906: 830: 829: 826: 822: 821: 818: 814: 813: 808: 804: 803: 800: 760:Access control 742:access control 737: 734: 732: 729: 717:barcode reader 707:Barcode reader 705:Main article: 702: 699: 674: 671: 669: 666: 650: 647: 626: 623: 609: 606: 601:Main article: 598: 595: 583:MultiMediaCard 579:Secure Digital 547:Main article: 544: 541: 509: 506: 471: 470: 469:access control 467: 463: 462: 459: 449:Access control 445: 442: 419:Main article: 416: 413: 407: 404: 363:device drivers 331: 330: 323: 319: 318: 315: 311: 310: 307: 303: 302: 299: 295: 294: 287: 283: 282: 279: 236: 233: 227: 224: 212: 209: 207: 204: 188:access control 184:identification 169:magnetic strip 149:storage medium 135: 134: 49: 47: 40: 26: 9: 6: 4: 3: 2: 1427: 1416: 1413: 1411: 1408: 1406: 1403: 1401: 1398: 1397: 1395: 1380: 1377: 1375: 1372: 1369: 1366: 1364: 1361: 1358: 1355: 1352: 1349: 1346: 1343: 1340: 1336: 1333: 1331: 1328: 1326: 1323: 1320: 1317: 1315: 1312: 1309: 1306: 1303: 1300: 1298: 1295: 1293: 1290: 1288: 1285: 1282: 1279: 1278: 1276: 1272: 1267: 1257: 1254: 1252: 1249: 1248: 1246: 1244:Main articles 1242: 1238: 1231: 1226: 1224: 1219: 1217: 1212: 1211: 1208: 1190: 1186: 1180: 1165: 1164:How OCR Works 1161: 1155: 1142: 1141:US US3553435A 1136: 1120: 1116: 1110: 1096:on 2008-10-11 1095: 1091: 1090: 1089:The Telegraph 1085: 1078: 1071: 1070: 1063: 1059: 1049: 1046: 1044: 1041: 1039: 1036: 1034: 1031: 1029: 1026: 1024: 1021: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 999: 996: 995: 989: 987: 983: 977: 964: 960: 957: 954: 950: 946: 943: 942: 941: 935: 931: 926: 921: 907: 903: 902: 901: 898: 896: 892: 888: 884: 878: 876: 875:door hardware 872: 868: 867:control panel 864: 860: 855: 853: 849: 845: 844:hand geometry 841: 837: 827: 823: 819: 815: 812: 809: 805: 798: 793: 787: 785: 781: 777: 773: 769: 765: 761: 753: 749: 747: 746:identity card 743: 724: 720: 718: 714: 708: 698: 696: 692: 691:business card 688: 684: 680: 679:image scanner 665: 662: 660: 657:sensors. The 656: 655:photoelectric 646: 638: 634: 632: 622: 619: 618:punched cards 615: 604: 594: 592: 588: 584: 580: 576: 572: 568: 560: 555: 550: 540: 538: 533: 531: 526: 522: 518: 517:ferromagnetic 514: 505: 502: 499: 496: 492: 488: 486: 482: 478: 468: 464: 457: 452: 440: 436: 427: 422: 412: 403: 401: 396: 394: 390: 389:cryptographic 386: 382: 378: 374: 370: 368: 364: 356: 352: 348: 345: 340: 338: 328: 327:ISO/IEC 14443 324: 321: 320: 316: 313: 312: 308: 305: 304: 300: 297: 296: 292: 288: 285: 284: 280: 277: 276: 270: 268: 264: 260: 251: 246: 242: 232: 223: 218: 203: 201: 197: 193: 189: 185: 180: 178: 174: 173:computer chip 170: 166: 165:plastic cards 162: 161:punched cards 158: 154: 150: 146: 142: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: –  77: 76:"Card reader" 73: 72:Find sources: 66: 62: 56: 55: 50:This article 48: 44: 39: 38: 33: 19: 1308:Memory Stick 1292:Express Card 1281:CompactFlash 1237:Memory cards 1192:. Retrieved 1189:IBM Heritage 1188: 1179: 1167:. Retrieved 1163: 1154: 1135: 1123:. Retrieved 1118: 1109: 1098:. Retrieved 1094:the original 1087: 1077: 1068: 1062: 1033:Punched card 979: 961:is a German 939: 899: 887:verification 879: 856: 833: 758: 739: 710: 676: 663: 652: 643: 628: 611: 575:CompactFlash 564: 534: 511: 503: 500: 497: 493: 489: 474: 409: 397: 393:applications 371: 341: 334: 322:Contactless 291:ISO/IEC 7816 281:Description 256: 229: 220: 196:data storage 181: 159:or holes on 145:input device 140: 138: 123: 117:October 2010 114: 104: 97: 90: 83: 71: 59:Please help 54:verification 51: 1405:Smart cards 1283:(CF, CFast) 1023:Memory card 947:(CAP) uses 863:probability 840:fingerprint 778:reader, a 571:memory card 342:The latest 337:proprietary 141:card reader 1394:Categories 1374:xD-Picture 1357:SmartMedia 1319:Microdrive 1194:25 January 1169:25 January 1125:25 January 1100:2008-10-13 1054:References 1003:Credential 932:PINsentry 891:processing 807:Media type 784:smart card 768:credential 685:that uses 683:mobile app 681:device or 573:such as a 477:LC circuit 433:See also: 259:smart card 241:Smart card 239:See also: 215:See also: 206:Mechanisms 143:is a data 87:newspapers 32:Cartomancy 1287:CFexpress 988:of 2002. 959:Geldkarte 836:biometric 587:pen drive 481:capacitor 385:interface 351:framework 269:(PIN). 1325:MiniCard 992:See also 953:phishing 930:Barclays 859:template 817:Capacity 786:reader. 780:bar code 659:IBM 2501 581:(SD) or 381:platform 157:barcodes 1345:PC Card 1339:MicroP2 1330:NT Card 914:Banking 713:barcode 695:rolodex 525:barcode 513:Wiegand 373:PKCS#11 192:banking 101:scholar 1314:miCard 1147:  936:device 883:server 645:them. 577:(CF), 375:is an 198:, and 103:  96:  89:  82:  74:  1370:(UFS) 1304:(MMC) 1297:JEIDA 1274:Types 825:Usage 466:Usage 344:PC/SC 278:Name 108:JSTOR 94:books 1359:(SM) 1321:(MD) 1196:2024 1171:2024 1127:2024 928:The 848:iris 731:Uses 697:'. 439:RFID 437:and 359:0x0B 347:CCID 314:T=3 306:T=2 298:T=1 286:T=0 243:and 190:and 177:RFID 80:news 1415:USB 1379:XQD 1363:SxS 949:EMV 591:USB 523:or 387:to 377:API 355:USB 293:-3 245:EMV 63:by 1396:: 1335:P2 1187:. 1162:. 1117:. 1086:. 897:. 877:. 854:. 846:, 842:, 748:. 719:. 565:A 329:. 202:. 194:, 186:, 175:, 171:, 139:A 1341:) 1337:( 1229:e 1222:t 1215:v 1198:. 1173:. 1129:. 1103:. 561:. 130:) 124:( 119:) 115:( 105:· 98:· 91:· 84:· 57:. 34:. 20:)

Index

Credit-card reader
Cartomancy

verification
improve this article
adding citations to reliable sources
"Card reader"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
input device
storage medium
optical scanning
barcodes
punched cards
plastic cards
magnetic strip
computer chip
RFID
identification
access control
banking
data storage
data processing
Magnetic stripe card
Smart card
EMV

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.