Fact-checked by Grok 2 weeks ago

Wiegand interface

The Wiegand interface is a widely adopted for transmitting data between card readers and controllers in electronic security systems, enabling the secure exchange of credential information such as facility codes and user IDs. Developed based on the discovered by inventor John R. Wiegand in the 1970s, it originally facilitated communication in magnetic stripe swipe cards but has evolved to support proximity cards, key fobs, and contactless smart cards. The interface operates using a simple two-wire (Data 0 and Data 1) asynchronous serial protocol that sends low-going electrical pulses, with typical pulse widths of 20-100 microseconds and intervals of 200 microseconds to 20 milliseconds, ensuring reliable unidirectional data flow over distances up to several hundred feet. The most common implementation is the 26-bit Wiegand format, standardized by the Security Industry Association () in 1996 as AC-01, which structures data into one even , eight facility code bits (allowing 0-255 unique sites), 16 cardholder ID bits (supporting 0-65,535 unique users per site), and one odd for error checking, yielding up to 16,777,216 total combinations. This powers the majority of legacy and modern systems, including those for building entry, time and attendance, and secure , due to its low cost, ease of , and broad across manufacturers. However, the protocol's limitations—such as its one-way communication, vulnerability to or spoofing without , and finite code capacity—have prompted transitions to more secure alternatives like OSDP (Open Supervised Device Protocol) in contemporary installations. Key components of a Wiegand system include the (e.g., a with Wiegand wire or coil that generates magnetic pulses when read), the reader (which detects and formats the signal), and the controller (which processes the data for access decisions). The Wiegand wire itself, a ferromagnetic known as Vicalloy, enhances durability and tamper resistance, making it suitable for high- environments despite the protocol's age. Despite these strengths, ongoing concerns have led to recommendations for hybrid or upgraded systems that maintain while incorporating bidirectional communication and .

Overview

Definition and Purpose

The Wiegand interface is a de facto wiring standard that facilitates the transmission of data from peripheral devices, such as proximity card readers and keypads, to central controllers in security and access control systems. Developed as an industry convention rather than a formally mandated specification, it establishes a common electrical and signaling framework to ensure compatibility and interoperability among components from different manufacturers. This standard, formalized in documents like the Security Industry Association's (SIA) AC-01 protocol for the 26-bit variant, defines the essential elements for unidirectional data transfer, including voltage levels, timing, and line configurations. The primary purpose of the Wiegand interface is to enable straightforward, cost-effective of authentication credentials, such as facility codes and individual user IDs, without requiring complex addressing or bidirectional exchange. By using a simple two-wire data line (plus ground and power), it minimizes wiring complexity and installation expenses while supporting reliable pulse-based signaling for short-distance connections typical in building security setups. This design prioritizes ease of for designers, allowing readers to encoded information from credentials like magnetic or proximity cards to controllers for verification and authorization decisions. The originates from the , a nonlinear magnetic phenomenon discovered by inventor John R. Wiegand in the early , which involves specially processed ferromagnetic wires capable of generating high-fidelity pulses for data encoding. Patented in 1974 as a bistable magnetic device, this effect was initially applied to create durable, tamper-resistant magnetic s where data could be stored in segments along the wire, producing detectable signals when read. The subsequent evolution into a communication bridged the gap between these early card technologies and broader system architectures. Key applications of the Wiegand interface center on physical , where it connects readers at entry points to backend controllers for door unlocking and logging. It also extends to time and attendance systems, enabling the tracking of employee check-ins via compatible readers that transmit data for and purposes.

History

The Wiegand interface originated from the , a nonlinear discovered by American inventor John R. Wiegand in the early 1970s while experimenting with specially annealed ferromagnetic wires that exhibit abrupt magnetization reversal when exposed to an external . This effect was patented in 1974 as a bistable suitable for encoding data in thin wires embedded within plastic cards, initially intended for secure identification and access applications by leveraging the wire's dual-layer structure—a soft inner core and hard outer shell—to store and transmit binary information without traditional magnetic stripes. The technology's early focus was on creating durable, tamper-resistant cards that could be read by proximity or swipe mechanisms, marking a shift from mechanical keys to electronic credentials in systems. Commercialization accelerated in the through companies like (originally Hughes Identification Devices, founded in ), which integrated the into practical card readers and controllers, establishing it as a industry standard due to the absence of formal international specifications. Key milestones included the introduction of the 26-bit format in the early , featuring one leading , an 8-bit facility code, a 16-bit card ID, and a trailing , which became the benchmark for compatibility across vendors. By the mid-, the gained widespread popularity in systems for its straightforward two-wire data transmission (Data 0 and Data 1 lines), enabling reliable integration with emerging microprocessor-based panels in commercial buildings and facilities. The Wiegand interface's dominance persisted into the , driven by its inherent simplicity in design—requiring minimal wiring and no complex —low implementation costs compared to alternatives, and broad compatibility with that lacked advanced processing capabilities. As of 2025, it remains embedded in over 90% of physical systems worldwide, supporting millions of installations in sectors like corporate offices and healthcare, though its adoption is declining amid growing vulnerabilities that expose unencrypted data to interception and tampering.

Technical Specifications

Physical Layer

The Wiegand interface utilizes a basic wiring configuration with three essential conductors: (black wire), Data 0 (green wire for transmitting 0 bits), and Data 1 (white wire for transmitting 1 bits). An optional red wire provides , typically +5 V DC or +12 V DC, to the reader device, enabling remote powering without separate cabling in many installations. Electrically, the interface operates on an open-collector configuration, where the Data 0 and Data 1 lines are pulled high to +5 V via resistors during idle states, ensuring a stable logic high. Data transmission occurs through momentary low pulses (pulling the respective line to ground) on either the Data 0 or Data 1 conductor, with typical pulse widths of 50–100 μs to represent bits. Access controllers incorporate pull-up resistors, commonly valued at 4.7 kΩ connected to +5 V, to detect these voltage transitions and interpret the signals accurately. This design supports cable runs up to 500 feet (150 m) on 18 AWG shielded wire without signal degradation or , though for lengths beyond 500 feet, must be evaluated, and thicker wire gauges (lower AWG numbers) may be necessary to maintain . The accommodates both 5 V and 12 V systems for power delivery to readers, while data line current draw remains low at approximately 1 mA per line during pulses, limited by the value. Readers actively generate these low-going output pulses, whereas controllers passively monitor the lines through their integrated pull-ups for reliable detection.

Data Protocol

The Wiegand interface utilizes an asynchronous transmission protocol that is strictly one-way, directing data from the reader device to the controller without any return path. Bits are encoded and sent as sequential low-going pulses exclusively on either the Data 0 (D0) line to represent a logic 0 or the Data 1 () line to represent a logic 1, ensuring that pulses on both lines never overlap to maintain . The encoding scheme resembles an inverted form of Manchester encoding in its use of pulse positioning for self-clocking but simplifies it to a single pulse per bit on one data line, with the lines otherwise held high in the idle state. To facilitate error detection, parity bits are included within the bit stream, typically an even parity bit for the first half of the data and an odd parity bit for the second half, allowing the receiver to verify the integrity of the transmitted information. Precise timing parameters govern the to accommodate varying capabilities while preventing misinterpretation: each must have a minimum width of 20 μs and a maximum of 100 μs, the between the trailing edge of one and the of the next ( ) ranges from a minimum of 200 μs to 20 ms, and complete messages are separated by at least 2 ms to allow the receiver to reset. These constraints yield an effective data rate equivalent to approximately 1 kbps, though the asynchronous nature means no fixed baud rate is enforced. Messages follow a structured format that begins with an initial even covering the ensuing data segment, proceeds through the core data fields (whose length varies by application, such as 24 bits in the common 26-bit format including parities), and terminates with a final over the remaining segment, ensuring overall balance without any sequence or postamble. The lacks support for acknowledgments, flow control, or bidirectional , relying on the reader's of fresh messages upon card presentation. Error handling is rudimentary and depends solely on the parity bits for detection; the receiving controller computes parity over each half of the message and discards any with mismatches, but no retransmission requests or advanced correction mechanisms are incorporated into the protocol.

Formats and Variations

Standard Bit Formats

The standard bit formats in the Wiegand interface refer to fixed-length data packets that encode facility identification and unique card identifiers, along with parity bits for error detection, transmitted serially from readers to controllers. These formats originated with early proximity card systems and remain foundational for compatibility in access control. The most prevalent are the 26-bit, 34-bit, and 37-bit variants, each balancing capacity for sites of varying scale while adhering to the protocol's simple binary structure. The 26-bit format, designated H10301 by , consists of a leading even , an 8-bit facility code (allowing up to 256 unique sites), a 16-bit ID (supporting unique s per facility), and a trailing odd , for a total of 26 data bits. This structure enables a maximum of 16,777,216 unique card-site combinations, suitable for small to medium installations. The 34-bit format, commonly associated with (formerly Northern Computers) systems and labeled N10002, expands capacity with a leading even , a 16-bit facility code (up to 65,536 sites), a 16-bit ID (up to 65,536 cards per facility), and a trailing odd . This design addresses the limitations of the 26-bit format for larger enterprises requiring more granular identification without shifting to fully schemes. The 37-bit format, an offering (H10304 with facility code), includes a leading even parity bit, a 16-bit facility code, a 19-bit card ID (up to 524,288 cards per facility), and a trailing odd parity bit, providing the highest capacity among standard formats. It represents the practical maximum for CR80-sized cards as defined in ISO/IEC 7810, optimizing data density on without exceeding typical reader processing limits.
FormatTotal BitsLeading ParityFacility Code (bits)Card ID (bits)Trailing ParityMax Cards per Facility
26-bit (H10301)26Even (1 bit)816Odd (1 bit)65,536
34-bit (N10002)34Even (1 bit)1616Odd (1 bit)65,536
37-bit (H10304)37Even (1 bit)1619Odd (1 bit)524,288
Parity bits ensure data integrity during transmission over potentially noisy lines. The leading even parity bit is calculated over the first 12 data bits, set to produce an even number of 1s when included with the parity bit (total 13 bits); the trailing odd parity bit covers the last 12 data bits, set for an odd number of 1s when included with the parity bit (total 13 bits). Computationally, the parity bit equals the XOR of the bits in its respective field, inverted if necessary to achieve the desired even or odd parity (e.g., for even parity, parity bit = XOR of data bits, ensuring total 1s even). Among these, the 26-bit format remains the most common in legacy HID Global systems due to its widespread adoption in early proximity deployments, though its capacity constraints have driven the proliferation of longer formats for modern, expansive sites.

Proprietary and Extended Formats

The HID Corporate 1000 format represents a proprietary 35-bit extension of the Wiegand interface, designed specifically for corporate access control applications to provide enhanced capacity beyond the standard 26-bit structure. This format allocates 12 bits for the site code (facility identifier), 20 bits for the card number (supporting over 1 million unique cards per site), 1 even parity bit, and 2 odd parity bits for error detection, enabling secure identification in large-scale deployments such as corporate campuses. It is commonly used with HID proximity cards, where the additional bits allow for unique company-specific encoding without compromising the Wiegand transmission protocol. Extended formats like 36-bit and 40-bit variations further adapt the Wiegand interface for specialized needs, incorporating extra bits to accommodate higher levels or additional fields such as multi-factor identifiers or checksums. For instance, the 36-bit format, often employed in systems from manufacturers like or Inner Range, typically includes 1 , 18 bits for code, 16 bits for card , and a closing , allowing for finer granularity in access segmentation. Similarly, the 40-bit format (e.g., the 4001 variant) features two bits—one even over the first 20 bits and one over all 40 bits—leaving 38 bits for , which can include expanded and fields or integrated checksums to reduce errors in demanding environments. These extensions are particularly valued in legacy systems requiring while scaling to more users or sites. The ABA (American Bankers Association) track format, originally developed for magnetic stripe cards, has been adapted for Wiegand interfaces through converters that encode track 2 data—typically up to 40 alphanumeric characters (around 200 bits in full)—into binary streams truncated to fit Wiegand controller limits, often 34 to 40 bits. This adaptation enables magstripe readers to interface with Wiegand-based panels by mapping account numbers and expiration data into facility and fields, though truncation can limit full data utilization in high-density banking or applications. Proprietary formats such as these introduce significant challenges, as manufacturer-specific field allocations (e.g., varying bit positions for or IDs) prevent seamless across diverse ecosystems. Systems mixing HID, GE, or other vendor cards often require dedicated converters or format translators to map to Wiegand outputs, increasing deployment complexity and costs in multi-vendor environments. As of 2025, modern Wiegand extensions increasingly incorporate approaches that blend traditional bit formats with RFID-derived , supporting up to 64 bits in advanced controllers to handle combined proximity and inputs. These , often seen in multi-technology readers, encode additional RFID elements like keys or biometric hashes into extended fields, maintaining Wiegand compatibility while facilitating transitions to more secure protocols without full system overhauls.

Security and Modern Usage

Vulnerabilities

The Wiegand interface transmits credential data, including facility codes and user IDs, in without any , rendering it highly susceptible to by intercepting the electrical pulses on the data lines. Attackers can capture these signals using low-cost tools such as microcontrollers or logic analyzers attached to the wiring between the reader and controller, often requiring only physical proximity to the cable run. The protocol's unidirectional nature provides no built-in , session supervision, or replay protection, enabling attackers to record valid pulse sequences and retransmit them to mimic a legitimate , thereby granting unauthorized access indefinitely until detected. This vulnerability stems from the design's reliance on simple voltage pulses without verification mechanisms, allowing replay attacks with basic hardware like a programmable device emulating the data lines. Exposed wiring in typical installations facilitates physical tampering, such as cutting lines to induce faults or shorting pins to inject malicious signals, often without triggering tamper alerts due to the absence of dedicated detection in the protocol. Common exploitation involves signal interception to credentials; for instance, inexpensive devices costing around $10 can decode and replicate 26-bit , enabling the creation of duplicate access tokens. Demonstrated hacks highlight the ease of compromise: in 2007, security researcher Zac Franken inserted a microcontroller between a reader and controller to harvest credentials and lock out authorized users, completing the setup in under five minutes. Similarly, in 2015, Bernhard Mehl used a compact to duplicate HID cards and access remotely via a , achieving interception and emulation in about 45 seconds. In large deployments, the standard 26-bit format exacerbates risks, supporting only unique user IDs per facility code (with 256 possible facility codes), which can lead to ID collisions and unintended access grants when user counts exceed this threshold. These inherent flaws continue to affect legacy systems as of 2025, where physical access to wiring remains a primary vector for exploitation.

Alternatives and Transitions

The Open Supervised Device Protocol (OSDP) serves as the leading alternative to the Wiegand interface in contemporary access control systems, offering a standardized, secure replacement developed in 2008 by HID Global and Mercury Security before its adoption by the Security Industry Association (SIA). OSDP enables bidirectional communication between readers and controllers, incorporates AES-128 encryption for data protection, and supports data rates up to 115.2 kbps over RS-485 wiring, allowing for efficient transmission of credentials and status updates. This protocol also facilitates continuous line supervision to detect faults or tampering, addressing key limitations of Wiegand's unidirectional, unencrypted design. Beyond OSDP, IP-based systems represent another major alternative, leveraging (PoE) readers that connect directly to network infrastructure for simplified installation and remote management in large-scale deployments. For wireless scenarios, (BLE) protocols enable secure, credential-free access using mobile devices, reducing reliance on physical wiring while maintaining low power consumption. Transitioning from Wiegand to OSDP typically involves converter modules, such as HID's backpacks, which translate legacy Wiegand signals into OSDP format without replacing existing readers. Hybrid controllers that natively support both protocols allow systems to operate in mixed modes during upgrades, minimizing disruption. In enterprise settings, phased upgrades prioritize critical entry points, enabling incremental replacement over time while leveraging OSDP's compatibility with existing cabling. Migration to these alternatives yields substantial benefits, including fortified security through and to prevent , extended transmission distances up to 4,000 feet with OSDP compared to Wiegand's 500-foot limit, and proactive tamper reporting via supervised connections. As of 2025, OSDP has gained strong traction, with its AES-128 meeting requirements for U.S. federal government applications, and the global OSDP reader market projected to grow at a 14.5% through 2028, signaling a notable shift from legacy protocols.

References

  1. [1]
    SIA AC-01-1996.10 | Access Control Standard Protocol for the 26 ...
    The specifications in this standard define a commonly used interface between card readers and control panels used in the Access Control, Security, Time and ...
  2. [2]
    [PDF] Wiegand? - Farpointe Data
    Wiegand (pronounced wee-gand) is a standardized interface protocol commonly utilized to communicate data between a credential and a reader, as well as between ...
  3. [3]
    Wiegand Door Controller and Access Control - Kisi
    Learn all about Wiegand in access control, including information on Wiegand devices, readers, the 26-bit Wiegand protocol, and the Wiegand effect.
  4. [4]
    Bistable magnetic device - US3820090A - Google Patents
    A bistable ferromagnetic wire of generally uniform composition having a central relatively ''''soft'''' core portion and an outer relatively ''''hard'''' ...
  5. [5]
    What Is Wiegand? A Brief History - Keri Systems
    Jul 27, 2017 · History of the Wiegand Interface. Wiegand card readers were invented after a scientist named John Wiegand applied a principle called the ...
  6. [6]
    From Keys and Cards to Mobile and Biometrics: A Brief History of ...
    Oct 23, 2023 · In this blog post, we've put together a brief history of the evolution of physical access control credentials to provide some useful context for decision ...Missing: commercialization | Show results with:commercialization
  7. [7]
    What is Open Supervised Device Protocol (OSDP)? - Bay Alarm
    Devices equipped with the Wiegand interface became popular in the 1980s, and it remained the go-to standard for decades. But the Wiegand interface is based on ...
  8. [8]
    Why choose OSDP over Wiegand in access control - White Papers
    Wiegand has been around for decades and remains widely used, mainly due to its simplicity and legacy system compatibility. Wiegand's primary drawback is poor ...Missing: dominance microprocessors
  9. [9]
    Vulnerabilities of Legacy Systems - ASSA ABLOY Intelligent Openings
    More than 90 percent of the PACS installed today use the Wiegand protocol, making it the most common communication method used by access control devices.Missing: 2025 millions
  10. [10]
    Understanding Wiegand [] - Suprema Knowledge Base
    Dec 30, 2019 · The Wiegand interface consists of three conductors (wires) called Data Zero (Green), Data One (White), and Ground (Black). When no data is being ...Missing: transmission distance
  11. [11]
    [PDF] 734 Wiegand Interface Modules: Level C - DMP.com
    The green wire carries Data Zero (D0), and the white wire carries Data One (D1). The red wire connects 12/24 VDC, 200 mA maximum power and the black wire is.
  12. [12]
    Access Control/How To Wire a Wiegand Reader - DahuaWiki
    Jul 10, 2018 · Step by Step instruction ; Red, 12v Power ; Blue, Case ; Black, GND ; White, D1.
  13. [13]
    US8943562B2 - Secure Wiegand communications - Google Patents
    The typical timing uses a pulse width of 50 μs and a 1 ms gap between pulses. ... Wiegand wires use open collector signals. This means that a reader or ...
  14. [14]
    [PDF] Integration and Configuration Guide - SpringCard
    Pull-up resistors must be provided on the Host side. Recommended values are. Rpull-up = 4.7kΩ if pulled to 5V (giving Imax in the D0 or D1 lines = 1.0mA) ...
  15. [15]
    What is the maximum distance for Wiegand reader cabling? - OSSI
    Feb 5, 2014 · The theoretical limit for Wiegand signal wire to a reader from the panel is 500 feet assuming you are using an 18 AWG shielded, excellent quality cable in a ...
  16. [16]
    Wiegand specification - BALTECH Docs
    Wiegand is a standard for read-only card reader connections, using data wires for card data and I/O wires for controlling LEDs. Data wires use asynchronous low ...Interface overview · Data wires · Message size · Frame format
  17. [17]
    None
    ### Summary of Wiegand Standard Bit Formats (26-bit, 34-bit, 37-bit)
  18. [18]
  19. [19]
    Understanding prox card formats | ProxSource - Proximity Cards
    Open and Proprietary Formats ; 34-bit, 0-255, 0-65,535, For Honeywell/Northern Computers systems ; 35-bit, 0-4,095, 0-1,048,575.Missing: structure | Show results with:structure
  20. [20]
  21. [21]
  22. [22]
    Access Control - Plastic-ID.com
    the cards are programmed, utilising 26-bit H10301 or 37-bit H10304 formatting. ... ISO/IEC 7810 specifications for ID-1 type cards. Compatible with all ...
  23. [23]
    [PDF] HID Proximity Card Format Guidelines - Access Hardware Supply
    Sales Policy: Just like the 26 bit format, the 37 bit format can be sold to any customer. ... 4 Programmed as a sequential 12 digit number. © 2008 HID Global ...
  24. [24]
    Examples of every access control bit format - AccessGrid Guides
    HID 40bit Honeywell - (P10001). Composed of 12-bit site code, 16-bit card ... This guide demonstrates how to decode the widely used 26-bit Wiegand protocol using ...
  25. [25]
    HID Card Formats | Everything ID
    ### Bit Structures for Standard Wiegand Formats
  26. [26]
    [PDF] 3.2.11 40-bit formats 3.2.11.1 40-bit format (4001) - Telaeris
    The 40-bit format has two parity bits (P1, P2) and 38 code bits. P1 is even parity over the first 20 bits, P2 is odd parity over the 40 bits. Facility and ...
  27. [27]
    [PDF] ABA TRACK 2 CONVERTER TECHNICAL SPECIFICATIONS
    The device allows you to convert the interface WIEGAND to the standard interface used by the ABA track 2. The converter allow to modernize and extend the ...
  28. [28]
  29. [29]
    [PDF] Wiegand Protocol Access: A Decade of Decryption
    Dec 13, 2017 · In regards to card reading technology, The Wiegand interface has been the most commonly used wiring standard since the late 1970s. Originally ...Missing: definition | Show results with:definition
  30. [30]
    Hacking Keycard Reader with Wiegand Protocol Vulnerability - Kisi
    Oct 17, 2024 · When John R. Wiegand, a renowned German engineer, discovered the Wiegand effect, he made a great discovery on how to make codes more secure ...Missing: origin | Show results with:origin
  31. [31]
    Why OSDP Has Become Access Control's International ... - HID Global
    Jan 30, 2024 · First introduced in the 1980s, these were heavily adopted by the industry, and they remain prevalent decades later. In fact, 90% of existing ...Missing: commercialization | Show results with:commercialization
  32. [32]
    Understanding OSDP - Stebilex
    Feb 24, 2023 · Advantages over Wiegand ; Data Transfer Rate, Up to 115.2 kbps, Up to 128 bits per second ; Cable Distance, Up to 4,000 feet, Up to 500 feet.
  33. [33]
    Open Supervised Device Protocol (OSDP)
    OSDP is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and ...SIA OSDP Verified · SIA OSDP Verified Products · SIA OSDP Verified Program...<|control11|><|separator|>
  34. [34]
    The top 6 cloud based access control systems in 2025 - Acre Security
    Discover the top cloud-based access control systems of 2025. Explore features, benefits, and comparisons to enhance your security solutions effectively.
  35. [35]
    4 Access Control Trends for 2025 - Chris Lewis Group
    Nov 20, 2024 · The top 4 access control trends for 2025 are: mobile credentials, biometric credentials, cloud-based systems, and AI/ML.1. Mobile Credentials For... · 2. Biometric Access Control... · 3. Cloud Based Access...
  36. [36]
    Top 5 Access Control Innovations for Businesses - Semieta
    Oct 10, 2025 · Can I upgrade to OSDP gradually? Absolutely. Many organisations start with high-priority doors and phase the upgrade over time. OSDP controllers ...
  37. [37]
    OSDP - Cypress Integration Solutions
    While the earliest version of OSDP was jointly developed in 2008 by ... OSDP-to-legacy Wiegand panel converter simplifies adoption of SIA's OSDP standard.Osdp Industry Articles · Osdp Takes The Next Big Step · The Osdp Standard
  38. [38]
    There Is a Hole in the Boat: Why Access Control Professionals Need ...
    Nov 9, 2021 · The first problem is that Wiegand-style systems transmit card reader data in one direction, from the card reader to the door controller.
  39. [39]
    Benefits of OSDP | ASSA ABLOY Intelligent Openings
    OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. OSDP constantly monitors wiring ...Missing: mandatory | Show results with:mandatory
  40. [40]
    osdp readers: Secure Access Control Solutions - Accio
    Rating 5.0 (34) 5 days ago · Market Trends of OSDP Readers. The global OSDP reader market is projected to reach $3.2 billion by 2028, growing at a 14.5% CAGR from 2023.<|separator|>