Sep 3rd 2025
All you need to know about Readers and Schlage Readers
What are readers?
- A reader is an electronic component of an access control system that communicates with an access control panel to grant or deny access to an opening when a credential is presented
- Readers require personalized credentials to enter an area and provide audit trails to show who accessed specific openings and when
- When a credential is presented to a reader, the reader sends the credential’s information, usually a badge number to the access control panel
- The panel compares the credential’s number to its programmed list of credentials, grants or denies the request, and sends a transaction log to a database
What are the advantages of readers?
- Greater security - By requiring personalized credentials to access an area, readers are more secure than a mechanical lock and key
- Visibility - Readers provide detailed audit trails showing who accessed specific openings and when, allowing for more visibility and control
- Cost-effective - Reduce the time and costs associated with managing keys due to frequent turnover
- Increased satisfaction - Enables convenient and efficient access to shared spaces while still providing a safe and secure door
What are the key things to know about readers?
Readers can be contact-based, which requires the credential to be swiped or touched by the reader or they can be contactless, which only requires a certain proximity or range to communicate
- Some readers are self-contained units on a door frame or wall, while others are part of a wireless electronic lock; in some cases, the reader and controller are combined into one unit, such as the Schlage RC
- Older readers might only work with a specific type of credential (mag stripe or proximity card); newer readers tend to operate with most types of credentials including mobile
- Some proprietary reader options only accept a specific type of credential, it is recommended to choose a technology that can be programmed by multiple companies to provide future flexibility
- While electronic solutions have grown in popularity, there are many applications that still require mechanical hardware and successful properties blend the two for a holistic experience
What are the different types of readers?
Regardless of the type, readers communicate with an access control system to grant or deny access to an opening when a credential is presented. While there are some proprietary reader options that only accept a specific type of credential, it is recommended to choose a technology that can be programmed by multiple companies to provide future flexibility to your clients.
Card readers (key card readers)
- Just as a key fits a lock, a card/fob requires a reader
- Credential options include smart, proximity and magnetic stripe, each with varying levels of security
- These credentials help overcome the costs and security challenges of key turnover
- If a card is lost, its number is simply erased from the system and the user receives a new card and number
Keypad readers
- Require a valid PIN for access
- PINs are easily shared or stolen, causing privacy concerns
- Best when used as a secondary authentication method (see multi-factor authentication)
Multi-technology readers
- Capable of reading both low 125 kHz proximity technology and high 13.56 MHz smart technology (including mobile) in the same reader
- Allows easy migration to smart and mobile technology from legacy mag stripe and proximity technology
- Facilities can use either proximity, smart cards or mobile-enabled smart phones in their existing system and upgrade over time as budgets allow
Multi-factor authentication readers
- Combines something that you have (card or fob) and something that you know (PIN code) to verify identification
- Raises level of security at high-risk openings
- Common in high security areas like laboratories, records offices and data centers
Enrollment readers
- Device used to add new credentials (cards, fobs, tags, phones, etc.) to your system
- Designed to simplify the enrollment of smart and multi-technology credentials
- Easily enroll credentials from desktop or lobby
- Saves time and eliminates the need for manual data entry and provides error-free identification
Biometric readers
- Most secure credential/reader option on the market
- Unique human characteristics act as the credential, such as the size or shape of the hand
- Only way to verify a person's true identity
- Common in high-security applications such as data centers, airports, banks and government buildings
What types of credentials work with readers?
Five types of credentials work with readers:
Mobile (includes Bluetooth® low energy aka BLE and Near Field Communication aka NFC)
- Based on latest encryption technology, using phones as credentials
- Eco-friendly; eliminates the need to replace cards or issue new ones
- Increased use of smartphones and apps makes them more common
Smart technology (aka 13.56 mHz or high frequency )
- Most secure contactless credential option
- Advanced data encryption makes duplication nearly impossible
- Two-way communication between the card and reader provides mutual authentication
- Multiple sectors on the card allow for storage beyond access control, including data storage and cashless vending
Proximity (aka 125 kHz or low frequency)
- Contactless card that doesn’t require physical contact with the reader
- May be read from within a few inches of the reader depending on the reader and card
- Storage limited to card number alone
- Limited security, duplication possible
Mag (magnetic) stripe
- Card credential must be swiped through a reader
- Limited encryption, which is more susceptible to duplication
- One-way communication only, making duplication possible
PIN code for keypad
- First connected credential
- PIN easily changed if access needs to be restricted
- PINs easily shared or stolen, causing privacy concerns Options are available to address single and double swinging doors, sliding doors, gates, and doors that require delayed egress
Why choose a multi-technology reader?
- In this world of acquisitions, mergers, and multiple/remote office locations, large organizations often find themselves burdened by a hodge-podge mix of card and reader access control technologies
- Multi-technology readers allow you to have blended reader populations and blended card populations for an indefinite period of time without compromising the functionality or reliability of your access control system
- Multi-technology readers are very affordable and just as reliable and easy to install as the familiar proximity reader
- Offering performance, security and unprecedented versatility, these products are truly today’s value leader and have become the new standard in reader technology
Why choose a multi-factor reader?
- Multi-factor authentication readers increase security in sensitive areas by requiring users to provide multiple credentials to gain access
- Could include any combination of the common authentication factors:
- Something you have (keys, cards, fobs or mobile devices)
- Something you know (the PIN code for a keypad or a password)
- Something you are (biometric asset such as fingerprint)
- Ideal for spaces that require a high level of security to protect private, dangerous expensive materials, goods or information such as:
- Health care - Records room, biohazard areas, pharmaceutical areas, laboratories and more
- Commercial - Data centers, server equipment rooms, records rooms, and more
- Higher education - Research labs, records offices, dorm rooms, and more
- For maximum security, we recommend using a multi-factor reader such as the Schlage MTK15 or MTKB15 with smart cards or mobile credentials to reduce risk of unauthorized use and duplication
What are the different reader connectivity types?
- Standard Wiegand output provides flexibility and allows the reader to interface with many common access control systems
- RS-485 output provides more robust security and uses bi-directional OSDP communication
- Note, not all RS-485 readers are OSDP Verified
- Watch the Intro to Access Control videos, Wired Communication Technologies and Wireless Communication Technologies to learn more
What is the difference between Wiegand and OSDP?
There are a few different ways that a reader sends information to a controller. Depending on the system, devices may send information over wires or wirelessly. Wiegand and OSDP are both wired protocols.
Wiegand
- One of the earliest methods and still very common today
- A simple method in which the ID number is a stream of ones and zeroes
- Compatible with most readers
- Uses one-way communication and does not have encryption
- Pulse weakens after 500 feet
OSDP (or Open Supervised Device Protocol)
- Newer secure alternative
- Uses RS-485, a serial communication protocol designed to provide higher level of communication, containing an A,B, and SC line
- Method allows data transmission to happen in stages
- Uses bidirectional communication and features 128-bit AES encryption
- Distance can reach about 3,000 feet
What types of credentials work with readers?
Five types of credentials work with readers:
Mobile (includes Bluetooth® low energy aka BLE and Near Field Communication aka NFC)
- Based on latest encryption technology, using phones as credentials
- Eco-friendly; eliminates the need to replace cards or issue new ones
- Increased use of smartphones and apps makes them more common
Smart technology (aka 13.56 mHz or high frequency )
- Most secure contactless credential option
- Advanced data encryption makes duplication nearly impossible
- Two-way communication between the card and reader provides mutual authentication
- Multiple sectors on the card allow for storage beyond access control, including data storage and cashless vending
Proximity (aka 125 kHz or low frequency)
- Contactless card that doesn’t require physical contact with the reader
- May be read from within a few inches of the reader depending on the reader and card
- Storage limited to card number alone
- Limited security, duplication possible
Mag (magnetic) stripe
- Card credential must be swiped through a reader
- Limited encryption, which is more susceptible to duplication
- One-way communication only, making duplication possible
PIN code for keypad
- First connected credential
- PIN easily changed if access needs to be restricted
- PINs easily shared or stolen, causing privacy concerns Options are available to address single and double swinging doors, sliding doors, gates, and doors that require delayed egress
What products are available?
- PR10 Proximity Mini-Mullion Reader
- SM10 Smart Mini-Mullion Reader
- MT11 Multi-Technology Mullion Reader
- MT15 Multi-Technology Wall Mount Reader
- MTK15 Multi-Technology Wall Mount Reader with Keypad
- MTMS15 Multi-Technology Reader with Magnetic Stripe
- MTMSK15 Multi-Technology Reader with Magnetic Stripe and Keypad
- MTB11 Mobile Enabled Multi-Technology Mullion Reader
- MTB15 Mobile Enabled Multi-Technology Wall Reader
- MTKB15 Mobile Enabled Multi-Technology Wall Reader with Keypad
- MT20 USB Credential Enrollment Reader
- MT20W Wi-Fi Credential Enrollment Reader
What educational resources are available?