inverseentropy wrote:When I say "it is not possible to share the same swipe card between doors owned by two different people in a secure way" I mean something like the following: your employer owns one door and the other door is on your house or is owned by another employer. The same key is to be used for all doors. In this case the owners of the various doors do not trust each other. A swipe card does not work in this case because your employer (or rather the agent that installed the door for them) can read all information off of your card when you swipe it. They could then use that to make a copy of the card which will open the door on your house.
I am going to say this again politely -- it is evident that you have some familiarity with hardware systems, yet at the same time you have never been exposed to the hardware and software configurations of an integrated access control system...
First: Your employer would NEVER allow you to use your company issued ID card (on which is the mag stripe which allows you access to the facility) for any other use, it is their property and as such they can ask you to surrender it to them at any time for any reason... How would you then gain entry to your other locations if your card was suddenly taken one day because some executive decided to change the logo on the front of the card and they had a replacement card all ready for you... Having multiple employers means having multiple ID/access cards, that is just a fact of life...
Second: The mag stripe reader on the access control device is ONLY reading the one single track on which the access control information is encoded, not the entire card... It is not a multi-track reader like you would attach to your computer or find at a point of purchase system in a store... The access control system does not have the capacity to read any extra tracks off the card nor store them anywhere... As far as any "agents that installed the system" that is total crap because once the system is installed and commissioned only the owner of the system has access to the database and any service techs would be supervised while doing any work on it...
Third: If you understood anything about how mag stripe access control systems work you would have understood that if you are using a swipe card system you can have a few systems on the same card if that is all they are being used for and each system doesn't have to trust the other since they are encoded on separate tracks on the card... Since that is rarely the case and ID cards are often used for time clock purposes by employers in addition to access control you now have fewer tracks left over to use elsewhere...
Fourth: Using a swipe card lock on the front door of one's house is an investment more so than the $800 for a quality electronic lock device, you are looking at needing a card encoder, the software for the security database and a programming cable to interface the computer with the access control DB to the lock for updates when a card is lost or new ones added...
inverseentropy wrote:Another scenario would be a situation where various rooms of a building have different security levels. There are a hundred doors that are low security and are installed by untrusted civilian technicians. A dozen doors in the basement guard high security areas and must be installed by trusted technicians with security clearance. An employee has one key that can open all of the rooms they have permission to access. If a technician put bad stuff in one of the low security doors then the high security doors are not comprimised.
That is not a scenario that one would encounter in real life unless there were two entirely separate access control systems in place using the same credential between the two systems in different ways... I.E. the lower security system uses the mag stripe and the higher security uses RFID or a Smart Chip in the same card...
What "bad stuff" would a technician have put inside the door controller at the unsecured doorway ? How would this have any impact on the other independent system since one technology can not read the codes off the other ?
It is clear that you really aren't familiar with the actual planning and deployment that goes into an access control system... If these different areas in a facility are controlled by the same authority they are generally part of the same system just perhaps using more secure means of holding the doors closed on better rated doors than the "lower security" counterparts...
In your fantastical example scenario above it would be much easier to obtain the ID card of someone with access and duplicate the swipe card to gain entry to the high security areas... Much easier to do than trying to add some recording device to the lower security doorways and then trying the recorded codes until one is found which has clearance for the high security areas and doesn't require being in coordination with the "trusted" security technicians who service the system...
inverseentropy wrote:This sort of deal is easy to accomplish using cryptographic techniques and can be implemented using $2 microcontrollers (plus the price of all the other parts like interfaces and motors). Something resembling RFID can be used to interface to the lock, but it would also be possible to just have a couple of electrical terminals (eg. nails) sticking out of the lock and interface using something like the Dallas 1-wire protocol (which also supplies power). A bit of isolation circuitry would be needed in case some joker decides to hook it to a tesla coil or something.
Again you are showing your knowledge of hardware in general but not the specific purposes for which access control devices are designed and used for... The controller boards used in a door controller box are much larger and more robust than anything you could implement using a $2 anything... Door controller boxes are capable of operating multiple doors and have a back up power supply inside most of the time for emergency operation during a power outage... Some even contain memory units which can store a list of credentials for priority access privileges during a communication failure with the system controller and access database depending on the features and programming used in the design...
~~ Evan