Home 5 White Paper 5 Wiegand Interface Readers Have 4 Core Problems

Wiegand Interface Readers Have 4 Core Problems

Problem

While extremely common, Wiegand interface readers are based on a hardware protocol that is almost 50 years old and poses a number of security and life safety risks in the modern world, as well as some significant installation limitations.

Details

1) Wiegand readers are unsupervised devices, meaning that they can be compromised without the customer knowing it, ironically creating a weak point in what are supposed to be secure systems.
The instructions on how to do it are readily available on the Internet. Two web sites that describe exactly how it can be done are:
https://www.wired.com/threatlevel/2007/08/open-sesame-acc/
https://www.securityinfowatch.com/Access+Control/hacking-wiegand-card-reader

2) They can also be vandalized, become defective, or even stolen with no notification to the system administrator. A system interfacing to a Wiegand output reader never knows if the reader goes off line or is removed, creating at best an inconvenience and at worst, a life safety issue.
Vandalized or destroyed readers can leave someone stranded outside in an non-secure area, without the ability to enter a building, which can create a serious life safety issue, not to mention a significant liability exposure.

3) The most commonly formatted card or fob used on a normal Wiegand interface reader has had the same exact ID number issued tens or even hundreds of times, creating the opportunity for a duplicate credential to gain access where it should be restricted.

4) Readers with a Wiegand interface are limited to a 500’ (150m) maximum distance from the controller using #18 AWG (1.2mm) 6 or 7 conductor cable. The distance is half of that if #22 AWG cable (0.6mm) is used.

Solution

Due to its popularity, Keri supports the Wiegand interface on all of its products. However, Keri’s NXT reader and controller communication uses a secure RS-485 interface and the readers are fully supervised and monitored by the system while a Wiegand interface solution is not. If a Keri reader is compromised or the cable is cut, the system operator is immediately notified with a message. Additional alerts can be set up within the software to include email or text message notification creating, a far more reliable and secure solution.
Keri’s NXT cards and fobs are all uniquely coded with billions of possible ID so there is never a duplicate ID issued, eliminating the chance of a purposeful or inadvertent granting of access to a duplicate card ID.
They also have an encrypted card number making them virtually impossible to predict internal patterns to duplicate cards.
Because the NXT readers communicate via RS-485, the cable distance is double that of Wiegand interface readers, and the 4 conductor cable used (including shielded CAT5) is 35%-50% less expensive than the shielded 7 conductor cable required for Wiegand output readers.

2305 Bering Dr, San Jose, CA 95131
Phone (800) 260-5265 / (408) 435-8400 / Fax (408) 577-1792

Summary

Wiegand technology readers create gaping holes in a security system, which by its nature is designed to provide security, not compromise it. This pervasive problem will only be overcome when the industry begins to embrace more secure reader technologies that provide greater levels of security for the facilities and people they are supposed to protect. The NXT system provides that secure technology.

Needed Equipment

1)NXT Controllers and NXT Readers as needed for Installation
2)NXT Cards or Tags
3)Keri – Doors.NET – Access Control Software

Latest Posts:

Reflecting on 2024: A Year of Innovation and Progress

Reflecting on 2024: A Year of Innovation and Progress

Reflecting 2024: A Year Of Innovation and Progress   As we close the chapter on 2024, we look back with pride at the milestones Keri Systems has achieved. This year was marked by groundbreaking innovation, strengthened partnerships, and an unwavering focus on...

Monthly Update: December Borealis Release

Monthly Update: December Borealis Release

Monthly Borealis Release: December UpdateHere's what's new in the December Borealis release:Hub Management Improvements The Hub Management Improvements introduces a range of powerful new features designed to enhance control, efficiency, and visibility across hubs. Key...

Get Ready for The Security Event 2025!

Get Ready for The Security Event 2025!

Get Ready for The Security Event 2025!Keri Systems is thrilled to announce that we’ll be exhibiting at The Security Event 2025, taking place April 8th–10th at the NEC Birmingham. We’re gearing up to showcase our game-changing advancements in access control technology...

Join Keri Systems at ISC East 2024

Join Keri Systems at ISC East 2024

Join Keri Systems at ISC East 2024We’re thrilled to announce that Keri Systems will be exhibiting at ISC East 2024, where we’ll showcase our latest advancements in access control technology! Mark your calendars for November 19th to November 21st at the Javits Center...

Get a Free Quote

Please enter your project’s specifications into the form below.