Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Role Playing; Rule Making

October 1, 2005
Ask any security director in a mid-to-large company about centrally controlling and managing doors, and they’ll probably answer with something along the lines of this:

“I’ve got about 5 percent of our doors under any type of central control. I’ve also got key management headaches, pressures to get better logging, and more and more questions about security and the remaining 95 percent of our doors.”

And why aren’t more of their doors electronically controlled and managed? “Cost” is the answer in nearly every case.

In fact, until now, the only practical, cost-effective way to control 95 percent of the doors in an enterprise has been with mechanical locks and keys. These have their own key management and lock maintenance issues, and for the vast majority of doors there is no record of when these doors are used and by whom.

Many end users would love to extend control throughout the enterprise by eliminating much of the cost of traditional, centrally managed access control systems. If such an architecture could work – eliminating network cable and connections to the access control panels, and wired or wireless connections to the card readers – it would reduce the per-door cost of access control by between 50 and 75 percent, allowing many more doors to be controlled and managed.

That’s the goal behind the card-connected architecture being implemented by some of the world’s largest reader manufacturers and head end system vendors.

Cost-reducing architecture

In smart card architecture, cards and the people who carry them replace the network. Using the cards to carry messages between readers can eliminate the need for a network connection. But in order for such a system to work, and for the majority of card readers to have no network connection, certain key elements must be addressed:

-Making access control decisions

-Recording access control history

?Updating information on cards

?Revoking access privileges

?Securing communications

Making access decisions

One way to get around readers (or panels) for cardholder lookup and access control is to use a rule-based and role-based scheme for access decisions. Such technology has existed in the IT world for over 10 years. In fact, role-based access control (RBAC) has been so successful in making large-scale IT access control systems manageable, that in 2004 the National Institute of Standards and Testing (NIST) published RBAC as an official standard.

In role-based access control, every cardholder is assigned a role. For example, in a hospital, these roles might include surgeon, ER nurse, pharmacist and maintenance supervisor. Privileges are assigned to the role, rather than to the cardholder directly.

One of the innovations with the card-connected architecture is combining rule-based decisions (where the rules reside in the reader) with role-based access control (where proof of the cardholder’s role resides on the card) so that a match between the cardholder’s role and the card reader rule grants access. Thus there is no need for a database lookup. IT digital signature technology is used to ensure that the information on the cards is not tampered with.

History, card updates

Access control history (card transactions) along with any system messages (like battery status) are also written to the smart cards by non-networked readers, and carried back to one of the network-connected readers in the system. The network-connected readers send the access control transactions and system messages to the front-end computer, where they are stored in the system’s historical database. The network-connected readers also write updated information to the cards, and can refresh a card each time it is presented.

Strategic placement of the few network-connected readers and the remaining non-networked readers ensures that normal cardholder traffic will carry around the various messages throughout the system. In this way, the cardholders are the network, carrying the system messages back and forth between network-connected readers and non-networked readers.

Revoking access privileges

If a cardholder doesn’t present his or her card to a networked-connected reader, how can the cardholder’s access privileges be revoked? A list of revoked cards would eventually grow too large for a single smart card’s reader’s capacity, so how is privilege revocation handled? Two simple but clever ideas combine to address this situation:

First, all card privileges expire daily (or at whatever short interval is currently set up in the system). Thus a card that is lost or stolen one day cannot be used the following day or anytime later to gain access.

In order to provide a means to immediately revoke privileges, very small daily revocation lists are used. Because all cards expire each day and must be renewed, the revocation list need only contain a single day’s revocations, if there are any.

Network-connected readers are updated immediately, and these readers write this list to the cards, which carry the list to the card-connected readers.

Securing communications

Secure communications are accomplished by using information security standards that have been proven in many types of applications in the IT world. These standards are used for all data written to cards, which is why the cards can also be used for more than just physical access control.

As products that take advantage of such technology come to market, security professionals should have cost-affordable ways to extend the benefits of traditional network-connected extended to remote locations – even desks, vehicles and other assets – where previously it was too costly.

Sidebar: Saving Through Twisted Cable

Fiber, cable, unshielded cable, twisted pair – there is a diversity of methods to carry security data. Most of the action involves transceivers, switchers and hubs, for instance. More recently, there has been a spotlight on such newer designs such as bundling access cabling for quicker installation as well as better protection from harsh environments.

One example: Honeywell of Pleasant Prairie, Wisc., has what the firm calls Genesis Series Profusion jacketless access control cable featuring a bundle of four individual shielded cables held together by a tight, continuous twist that can be easily separated for unique data or communications tasks. The design delivers lock power, card reader, door contact and request for exit in a single bundle. Unlike other bundled cables, the new design does not use messy adhesives. Each cable is color-coded and features sequential footage markings. Lighter in weight than traditional cable, it practically eliminates cold weather cracking problems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • office with cubicles

    Alert and investigation fatigue is playing a role in employee burnout

    See More
  • cameras surveillance

    Cloud-based solutions playing crucial role in current and future of commercial security space

    See More
  • Playing with Trucks; Playing for Keeps

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!