Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

When Is Retrofit a Matter of Inches?

October 8, 2008


Thirty-two inches to be exact. That’s among the differences between ISO 15693 and ISO 14443. Now, before you stop reading, feeling snowed under by those weird numbers, realize that contactless smartcard standards are important and matching an existing standard to an enterprise application can make a big difference to your bottom line and relationship among the users of your card access system.

   
Both 15693 and 14443 are radio frequency identification (RFID) basics. The former, when packaged for enterprises, is called a vicinity card with read distances of up to three feet. The latter is more a proximity card with a read distance of up to four inches.

   
And, if you can stand yet another ISO number, 7816, compatible only with 14443, is the internationally accepted family of standards primarily dealing with aspects of smartcard interoperability regarding communication characteristics, physical properties and application identifiers of the implanted chip and data. Vicinity cards are not ISO 7816 compatible.

   
RFID experts such as Bob Fee of LEGIC Identsystems know that 14443 has garnered more headlines thanks to applications such as ePassports, FIPS-201 and financial payment systems.



ADVANTAGES THANKS TO APPLICATIONS

The U.S. Electronic Passport (e-Passport) is the same as a regular passport with the addition of a small contactless integrated computer chip embedded in the back cover. The chip securely stores the same data visually displayed on the photo page of the passport, and additionally includes a digital photograph. The inclusion of the digital photograph enables biometric comparison, through the use of facial recognition technology, at international borders. The e-Passport also has a new look, incorporating additional anti-fraud and security features. Since August 2007, the has been issuing only e-Passports.

   
FIPS 201 (Federal Information Processing Standards Publication 201) is a federal government standard that specifies personal identity verification (PIV) requirements for federal employees and contractors. Thanks to the PIV, smartcards grant access to the cardholder to federal facilities and information systems; assure appropriate levels of security for all applicable federal applications; and provide interoperability among Federal organizations using the
standards.

   
One example of financial applications based on ISO 14443 is the CatCard, the official identification card. All students, faculty and staff affiliated with the university need to carry the CatCard for identification. It features a digitized photo, digitized signature, a smart chip and magnetic stripe. The CatCard also allows a wide range of on-campus services such as meal plans, photocopying, printing, parking, vending machines and laundry.

   
The card includes a “free read” unique identification (UID) that replaces more personal identifiers for privacy concerns; a smart chip for small amount purchases; and the magnetic stripe for building access and meal plans.

   
With the popularity of RFID proximity, technology experts such as Fee question if “15693 has fallen from grace or is its prevalent use in competing applications just falling under the current radar?”

   
When comparing the two international contactless smartcard standards, it is a good plan for security leaders to look at the differences.

   
Key attributes of both standards: 

  • Both are based on the same radio frequency of 13.56 MHz.
  • Both provide the same free read of the UID/card serial number.
  • 15693 read range is up to 36 inches while 14443 is up to four inches.
  • 15693 data exchange rate is 26 kbps while 14443 is 106 kbps and higher.
  • 15693 is not compatible with ISO 7816 commands while 14443 is.

Compliancy is a marketing term, contended Fee, so he suggests buyers pay attention to details or seek advice from knowledgeable systems integrators.



WHAT ISO STANDARDS DON’T COVER

Standardization provides multiple benefits including interoperability, multiple sourcing and long-term product availability. While it is important to understand what standardization can offer it is also important to fully understand what’s not specified. Here is where the rubber really meets the road, according to Fee, and where security leaders who simply put out requests for proposals or RFPs without knowing the serious implications could end up purchasing products that are not compatible. Here are key items not covered by the standard.

  • Encryption is defined by the host application.
  • Key length.
  • Key management (e.g., how the “keys” are secured within your company).
  • Authentication process between reader and credential.
  • The IC’s memory structure. Some have pre-defined sectors limiting flexibility.
  • Memory access: How are individual data files accessed? Is a master directory required to be established and managed by someone year after year?
  • Application data structure.
  • Conditions for access rights on memory areas.


BENEFITS OF ISO 15693

There are a number of benefits of vicinity cards that fall to the bottom line.

  • Interoperability (use credentials across entire system).
  • Multiple sourcing (use various suppliers for same solution).
  • Long-term availability (you can switch suppliers easily).

Here are additional benefits of ISO 15693 including some manufacturer’s non-standard capabilities to enhance the standard.

  • Read/write to the credential on the fly (no re-badging to add/delete apps).
  • Mutual authentication between the reader and credential.
  • Encryption support including DES, 3DES and proprietary encryption.
  • Longer read range.
  • You don’t have to “tap” the reader so it’s great for access control, parking, transit, desks, cabinets, and even water parks for lockers and vending machines.
  • For the same size antenna the read range could be as much as 50 percent and 70 percent greater distance (vs. 14443).
  • Better solution for harsh environments where a reader has to have its antenna in metal or a smaller antenna size
    must be used.
  • Data transmission rate that is five times faster than a 125K prox-based system. While the data rate of 26 kbps is less than ISO 14443 typical access control files are small so the lower speed is barely experienced unless a biometric is being used.
  • Price points are equivalent to or better than ISO 14443 solutions.


WHERE IS ISO 15693 BEING USED?

LEGIC’s Fee believes that there are literally thousands of companies using 15693 in varying degrees of compliancy.

   
So is the vicinity card a forgotten standard? In truth, it is alive and doing well. It could be the better standard when retrofitting electronic access control to a smartcard approach.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • When Is a Laptop Worth $20 Million? When It is a VA Laptop

    See More
  • cyber software freepik

    When it comes to cyber risk, company size doesn't matter

    See More
  • compliance security leaders say covid has increased risk profile of their organization

    A matter of trust

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • security book.jpg

    Security Investigations: A Professional’s Guide

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!