SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Customisation considerations for embedded system RFID readers

Customisation considerations for embedded system RFID readers
Kiran Vasishta
Kiran Vasishta
Contact company
Contact ELATEC USA
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • RFID readership crucial for OEMs seeking future-proof, secure contactless credential systems.
  • Customisation critical for supporting multiple credential technologies and security requirements.
  • Reader flexibility essential for software integration, remote updates, and communication protocol.

With increasing security and public health concerns, contactless credentials are gaining more and more importance. Contactless credentials can be divided into two main categories: soft credentials that include mobile phone applications that tap into their BLE/NFC hardware and transmit the data, and hard credentials that typically include low frequency (125 kHz) and high frequency (13.56MHz) based passive RFID transponders.

With the help of these credentials, organisations can tackle safety concerns related to other common user authentication and access control solutions such as biometrics, password/PIN, and magstripe.

OEMs and system integrators

Currently, RFID readers can be found in numerous devices requiring user authentication, authorisation, and access control, from doors to multifunction printers to point of sale terminals to computers and more.

One of the main goals of an OEM or a system integrator should be to select a reader that is “future proof”

As OEMs and system integrators increasingly consider adding a security aspect to their product, choosing an appropriate RFID reader becomes that much more important. One of the main goals of an OEM or a system integrator should be to select a reader that is “future proof” or built to sustain the advancement or shift in the market from a technical standpoint.

Hard or soft credential

Furthermore, it should be kept in mind that customers have varied needs and requirements. This is especially true when dealing with customers that use contactless credentials.

Depending on the type of customer even the type of hard or soft credential will vary. For example, a product deployed in a university will have different security needs compared to the one deployed in a federal office. Not only the credentials are different in the above scenario but the level of security is different as well.

Customisation consideration goals

This article covers some of the important customisation considerations that can help satisfy OEM’s or integrator’s goals of a future-proof device and also a device that can accommodate the requirements of different customers.

Can the reader's output format be changed or adjusted?

There are instances with a requirement to match credential IDs that are already part of the end user’s database

The reader is typically a small component of the product manufacturer's ecosystem. Usually, the embedded product has a host that runs its application that interacts with a backend system or a database. There are instances with a requirement to match credential IDs that are already part of the end user’s database or active directory.

In systems where the host application cannot manipulate the reader's data, it becomes very important that the reader can manipulate and adjust its output to help match the credential ID stored in a database.

Can the reader read multiple technologies with the same hardware?

There are numerous RF standards and technologies present in the market. Some examples of RF standards are ISO14443A/B, ISO 15693, etc., and some examples of RF technologies are NFC HCE, EM4x02, Prox, etc. The reader must be able to fully support these transponders. This not only ensures that the RFID reader is capable of detecting the technology, but it ensures that it can support them to its full extent.

For example, users may use a UID (unique identification number) as a credential ID and in some instances, users employ memory-based transponders that contain the credential ID stored in one of the memory sectors. So, it is critical that the reader not only supports reading the UID but also the memory segments of the transponder.

Does the reader have reconfiguration flexibility post integration?

Having the flexibility to change the reader's firmware or configuration is necessary when considering an embedded product with a reader integrated as a subsystem. This allows the reader's software to be updated in the event a new credential is added to the customer's fleet or in a scenario where the customer decides to opt for a higher security-based credential.

Look for the capabilities of remote and/or contactless reconfiguration, updates, and upgrades

Although the feature to be able to reconfigure the reader is critical, it is even more important to have a reasonable way of updating the readers. Imagine an instance wherein the readers are embedded within the user’s end products and the only method available to update the reader is by dismantling it from the enclosure.

Now, compound this effort with a distributed fleet of hundreds of such devices with readers embedded in an enclosure. To avoid such a daunting task, look for the capabilities of remote and/or contactless reconfiguration, updates, and upgrades such as over-the-air via NFC or BLE, or via contactless RFID configuration card or app.

How does the reader integrate with the host application software?

When Elatec refers to the host application, it is referring to the software component that directly interacts with the reader. Typically, the reader either communicates with the whole system as a keyboard device or as a serial device. There are also instances wherein the host application expects the reader to work as a PC/ SC (personal computer / smart card) device.

It is very important to understand the software specifications of the host application as it directly affects the functioning of the reader. One should evaluate if appropriate drivers are being made available to the embedded designers and whether the reader will be able to appropriately interact with the host via standard software communication protocols.

Even though there is a certain amount of software development necessary for the communication to occur between embedded devices. Whether or not this effort can be reduced is a question one should evaluate when choosing the reader.

Can the communication protocol be customised?

In embedded design projects, one of the key aspects is the execution of embedded applications that are created for a very specific purpose. For example, the end goal of the embedded product could be to complete a secure transaction or exchange information under time constraints.

Any electronic device that interfaces with the host running an embedded application need to work to fulfill the end goal

Any electronic device that interfaces with the host running an embedded application need to work hand in hand with it to fulfill the end goal. In some situations, the task of the reader could be to simply send the data over a serial line. In other situations, the task would be to perform operations based on the input given by the embedded host application or hardware.

An example of such a scenario would be when the host expects the reader to detect transponders only when a particular character is transmitted to the reader. Another example would be that the reader would execute a sequence of commands based on a GPIO output initiated by the host. It can be very beneficial if the reader can run a custom protocol under the embedded host.

Can the security algorithm and data integrity check be customized?

Typically, it is desirable to have popular encryption standards such as AES, DES, 3DES, etc. to be part of the reader’s firmware. This would help embedded designers readily take advantage of these encryption methodologies. But there are cases wherein the host system is using a HashMap-based algorithm. In such a scenario the reader should have the capability to implement the algorithm and produce an output that can be correctly processed.

There are scenarios wherein the host system is also expecting CRCs (Cyclic Redundancy Checks) to be part of the data stream to verify the integrity of the data. It is extremely helpful if the reader can run applications and implement custom algorithms so that the host can properly decrypt the data and also verify data integrity.

Does the reader have the ability to control the use of feedback?

One of the most important considerations is having the ability to modify the reader's user feedback or physical behaviour per the customer's needs. Some customers expect the reader to blink a Green LED when an RFID card is presented, and some expect the reader to beep and transition its LED colour state from red to green.

Having the ability to control this basic feedback (and more) or response to an event initiated by the user is of prime importance.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Fleet surveillance
  • Remote video surveillance
  • Electronic security systems
  • Remote security
  • Commercial security
  • Security management
  • Security devices
  • Security installation
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Network monitoring
  • Remote video monitoring
  • Wireless security
  • Security service
  • Security communication
  • Integration software
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Touchless Security
  • Related links
  • Articles by Kiran Vasishta
  • Related categories
  • Mechanical digital locks
  • Access control software
  • Access control readers
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Discover embedded RFID readers, their customisation benefits, and top considerations for seamless access control in security systems.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec