Dual Technology Credentials
By Ryan Kaullen, Field Services Manager at Kenton Brothers
Access Control has been around for a few decades now, and during that time the technology has evolved. A lot of customers have older access control equipment and can’t afford to change out equipment every time technology and security solutions change. What are ways that a company can increase security but not have to change out everything all at once? How can they avoid impacting large portions of the their current access control solution? One way is by using Dual Technology Credentials.
Proximity Technology
The industry standard at the beginning of development of access control solutions was called proximity technology.
Proximity is a non-encrypted technology. As technology has advanced, and those who wish to hack or break through the security have advanced, the industry adapted. More advanced types of technology were required to combat those new threats. These advanced defenses include solutions like multi technology, new readers with encryption, advanced card formats, and more.
This is where Dual Technology Credentials come into play.
Changing your credential to dual technology allows you to use older technology readers along with the newer options. All while enjoying the benefits of having an encrypted credential for higher security.
Over time, you will be able to upgrade your readers to a newer type of encrypted reader. (In other words, spreading out the investment timeline for doing the reader upgrades.) You will still be able to use your dual technology credentials, but once all the readers have been updated, you can switch from a dual technology credential to an encrypted credential. This will lower the cost of your credentials moving forward while still keeping the correct standard of credential security.
Individuals who intend to cause harm to a location often try to go for the low hanging fruit… which includes access control credentials. A repeater is used to try and reveal the card or FOB’s credentials. This allows them to re-create the card and allow entry. This is where dual technology credentials can really make a difference.
If you are interested in learning more about Dual Technology Credentials, please contact us and we would be happy to see where we can help heighten security and protect your people, property, and possessions.
Today, I want to talk about credential technology. While not an extremely exciting topic, it can be, and often is the weakest link in many organization’s access control system. Remember that an attacker doesn’t need to get through every defense in your system, most often they just need to get past the weakest one (or two).
When an encrypted technology is in use, both the card and reader must be using the same set of keys. Public/Private key is a long topic, but effectively a matching pair of keys are used to encrypt and decrypt data. (



We recently received a Chain of Custody request from one of our banking clients. They had an event that they deemed legally significant and requested our help in documenting what had happened. They needed our help to get the video segments exported properly. They wanted footage from all of the cameras at one of their locations over the past 30 days. (That’s a good amount of video data!)
Chain of Custody is something Kenton Brothers takes extremely seriously for many reasons. One, we want to make sure we are providing our customers with a level of service and reliability they can count on. We also want to make sure law enforcement has what they need to support or refute claims. This is also a great example of how the commercial security systems we sell and support do what they’re supposed to do.
As in all security, it only takes one weak link to bring the whole castle down. You can have the best moat, the best turrets, and the best drawbridge. But if there was a secret, unguarded passage and the enemy discovered it, it could certainly lead to your demise. In the commercial access control world, the Weigand Protocol is that un-guarded secret passage.
If you look online, you can find a board that can be installed between a reader and control panel that will intercept and log every access card being used. The board is smaller than a poker chip and can be installed behind a reader pretty easily. Once installed, it is powered by the door controller and is completely invisible to the reader and access control system. The attacker can leave it in place for a few days or a few weeks, while it collects every card read. Then, when they are ready, they can retrieve the list of cards from the built-in Wi-Fi interface. If the attacker only needs access to get into that single door, they can even “replay” the card number from the Weigand interface back to the door controller, probably granting access. If they need access to multiple doors, they could use the information to recreate identical cards to the ones you are using.
I need to mention a side note here for 