Alliance Activities : Publications : Guide Specification for Architects and Engineers for Smart Card-based PACS Cards and Readers for Non-government PACS
Guide Specification for Architects and Engineers for Smart Card-based PACS Cards and Readers for Non-government PACS
Publication Date: April 2015
Smart cards are increasingly accepted as the credential of choice for securely authenticating identity, determining appropriate levels of information access and controlling physical access. To further advance the adoption of high security smart card-based physical access control systems (PACS), the Smart Card Alliance tool, “Guide Specification for Architects and Engineers for Smart Card-based PACS Cards and Readers for Non-government PACS,” helps architects, engineers, consultants, integrators, manufacturers and end users incorporate smart card-based PACS cards and readers into architectural and engineering specifications for non-government facilities.
This resource contains sample guide specifications for 13.56 MHz contactless smart card technology products. The guide specification is written using industry standard formatting and language (e.g., Construction Specification Institute (CSI) Division 28 – Electronic Safety and Security Section 28 13 Electronic Security System), and is designed for use by architects, consultants, and specifying engineers who are preparing bid specifications for physical access control, building control, and security systems for non-government facilities.
The Microsoft Word version of these specifications may be copied into the appropriate sections of a complete bid specification by using the “cut and paste” method. An “annotated version” is also available. As an educational resource for the specifier, the annotated specification includes links to commentary that describes or defines terminology and content included in the specification.
This document is specific to the requirements for use of modern secure smart card technology in physical access control system (PACS) applications. It focuses on the card-to-reader operations and is intended to work with a wide variety of commercial PACS. The specification assumes the card data model is designed in accordance with the specific PACS being implemented. Successful security deployments are a shared responsibility by all involved in the solution supply chain. Proper installations not only involve the specification but also include the responsibilities of the manufacturer, integrator and end user to deploy, operate and maintain the solution. These responsibilities should be clearly defined in the project documentation and associated processes and procedures.
These specifications do not guarantee performance. Performance is the result of many factors, including, but not limited to, how the system is deployed, what environment it is being deployed into, and how it is used.
Products covered are focused on PACS applications and include reference to commercially available products. Access control credentials and accessories are also included. This specification does not endorse any specific product or service. Product or service references are provided as examples.
Note that this specification was developed to be used for commercial, non-government PACS implementations. The specification does not apply to and should not be used for federal facilities.
This specification is maintained by the Smart Card Alliance Access Control Council. As with any specification, the Smart Card Alliance anticipates that there may be questions and interpretations that arise when using this specification. Please send all correspondence to ACCA&[email protected].
These “Section 16720 Smart Card Access Control System” specifications (the “Form Specifications”) are general in nature and solely for illustration. The Form Specifications are not intended for any specific application or use and project specific considerations must be taken into account in the architect’s or engineer’s preparation of actual system specifications. The Smart Card Alliance makes no representation or warranty with respect to these Form Specifications and nothing contained herein shall create, or be inferred to create, any express or implied warranty by the Smart Card Alliance. These Form Specifications are intended solely for the purpose of reflecting general guidelines for smart card physical access control system specifications. The architect or engineer preparing the actual smart card specifications should therefore refer to and confirm actual manufacturer’s specifications. The Smart Card Alliance assumes no liability with respect to, arising from, or arising out of the Form Specifications or any use thereof.
About this Resource
This white paper was developed by the Smart Card Alliance Access Control Council to provide a tool for architects, engineers, consultants, integrators, manufacturers and end users to incorporate smart card-based physical access control cards and readers into specifications for non-government PACS implementations.
Smart Card Alliance members contributing to the resource included: Advanced Card Systems, Ltd.; Allegion; AMAG Technology, Inc.; Booz Allen Hamilton; CH2M HILL; Eid Passport Inc.; GSA; HID Global; HP Enterprise Services; Identification Technology Partners, Inc.; Identiv; IDmachines; IQ Devices; NXP Semiconductors; Oberthur Technologies; Quantum Secure Inc.; Roehr Consulting; Secure Mission Solutions; Stanley Security Solutions; Tyco Software House; U.S. Department of State; XTec, Inc.
About the Smart Card Alliance Access Control Council
The Smart Card Alliance Access Control Council is focused on accelerating the widespread acceptance, use, and application of smart card technology for physical and logical access control. The group brings together, in an open forum, leading users and technologists from both the public and private sectors and works on activities that are important to the access control community and that will help expand smart card technology adoption in this important market. The Council works on projects to stimulate the use of smart card technology for access control.