A token-based approach to access control relies on something you have such as a physical or digital token to prove you are allowed to enter a door, unlock a turnstile, or access a system. Tokens include contactless cards (RFID, NFC), key fobs, smart cards, mobile credentials (BLE/NFC on a phone or watch), and one-time password (OTP) generators. In classic authentication models, this possession factor sits alongside “something you know” (PIN/password) and “something you are” (biometrics).
Also known as: badge-based access, card access, proximity card/fob access, RFID access, mobile credential access, possession-factor authentication.
In the world of physical security, the word token covers any object a person can carry and present to a system to prove they should be let in. Traditionally, this has meant a plastic badge, a key fob, or a smart card with a chip embedded in it. More recently, it has expanded to include mobile phones and smartwatches, which can use Bluetooth Low Energy (BLE) or Near Field Communication (NFC) to act as digital passes. Even devices that generate one-time passwords fall into this category, although they are more common in IT login scenarios than at doorways.
What unites all these tokens is that they are rooted in the “something you have” model of authentication. If you hold the right object, you can open the right door. But the object itself says nothing about who you are. That separation between object and identity has been the core limitation of token-based approaches since the beginning, and one of the main reasons organizations are looking elsewhere for greater assurance.
At a high level, token systems are deceptively simple. An administrator issues a card or credential, links it in the database to an employee or visitor, and hands it out. When the user arrives at a door, they present the token to a reader. The reader forwards that data to a controller, which checks it against permissions, makes a grant or deny decision, and logs the event. The process takes a fraction of a second, which is why tap to enter is so familiar.
Behind that seamless action, however, lies a critical detail: the communication between the reader and the controller. Historically, this was handled by the Wiegand protocol, which simply sends the badge ID in plain text.
More secure modern systems use the OSDP (Open Supervised Device Protocol) standard, which allows encrypted, two-way communication. The strength of any token system is therefore not just the token itself but also the integrity of the infrastructure it rides on.
Not all tokens are created equal. The oldest systems use 125 kHz prox cards, which carry only a simple identifier. These identifiers can be cloned with off-the-shelf equipment, making them easy targets for attackers.
Slightly newer systems, such as MIFARE Classic, attempted to add encryption, but weaknesses discovered years ago left them similarly vulnerable to duplication. More modern credentials, like MIFARE DESFire EV2 cards or carefully implemented mobile credentials, raise the bar with strong cryptography and secure key management. Still, they are tokens and tokens can be borrowed, lost, or intercepted. Even mobile passes, which feel futuristic, can be subject to relay attacks where attackers trick a system into believing the authorized device is nearby. This range of security levels is why one building’s badge might be easily cloneable, while another’s requires significant effort to compromise.
Tokens continue to thrive in places where convenience and speed matter most. Handing a temporary badge to a contractor or scanning a phone at a parking gate are workflows people intuitively understand. Tokens are also simple to issue. They can be printed, mailed, or even emailed as mobile passes, without much friction for administrators.
But these same benefits carry hidden weaknesses. A token doesn’t verify who is actually holding it. Lost or stolen cards often go unnoticed, and “buddy punching”—where one employee lends their badge to another remains a persistent problem. In high-security environments, these shortcomings make token-only access a liability, since the system is essentially authenticating objects rather than individuals.


The fundamental problem is that tokens are detached from identity. They prove possession but not personhood. As attackers have become more sophisticated, cloning, replaying, or relaying tokens has become easier, meaning organizations cannot rely solely on them to protect critical assets. With tokens, the weakest link is often enough for an attacker to get through.
By contrast, biometric access control shifts the model to “something you are.” This approach directly binds access to the individual, reducing entire categories of risk. An attacker cannot simply borrow someone’s face or fingerprint the way they can borrow a badge. Combined with advances in liveness detection and biometric standards, this has made biometrics far more reliable and resilient than token-only systems in real-world deployments.
Two protocols dominate the conversation: Wiegand and OSDP. Wiegand, still widely deployed, is a legacy protocol that transmits unencrypted data between readers and controllers. That means anyone who taps into the wires can capture, replay, or manipulate the signals. Devices such as the ESPKey have shown just how easy it is to exploit these weaknesses, which is why Wiegand is being phased out.
OSDP, on the other hand, was developed as a secure, supervised, and bidirectional alternative. When configured with Secure Channel encryption, it greatly reduces the risk of interception or tampering. Yet, even OSDP is not foolproof. If installers leave encryption disabled or use default settings, the system can still be downgraded or compromised. Protocols matter, but they must be implemented properly to deliver the protection they promise.
The short answer: they can be, but not always. Using a phone or smartwatch as a credential brings obvious convenience. People rarely forget their phone at home, and credentials can be distributed instantly over the cloud. For many organizations, this is a major upgrade over managing physical card stock.
However, mobile credentials remain vulnerable to relay attacks, where attackers extend the communication range and trick the reader into unlocking a door for someone who is not physically present. Security researchers have demonstrated that even well-designed Bluetooth systems can be fooled this way. Mitigations such as secure distance measurement, device motion checks, or user-presence requirements help, but they don’t eliminate the fact that a mobile credential is still, at its core, a token.
Biometric authentication closes the gap by connecting access rights to the actual person. Instead of verifying a card or a phone, the system verifies the individual’s unique features such as a face, fingerprint, or iris. This approach eliminates the problem of lost, stolen, or borrowed tokens altogether, since access cannot be transferred from one individual to another. Beyond security, biometrics improves ease of use. Walking through a turnstile without stopping to present a badge feels natural and fluid. Combined with advances in accuracy, speed, and anti-spoofing, biometric systems now deliver both stronger assurance and smoother daily experience. In many deployments, once users adapt, they find biometric access faster and less burdensome than juggling physical tokens.
Moving from a token-centric system to a biometrics-first one does not have to mean ripping out existing infrastructure. A common strategy is to modernize the “plumbing” first, which is basically replacing legacy Wiegand wiring with OSDP-ready controllers and readers. This ensures the system is secure enough to handle stronger credentials, whether biometric or token-based.
From there, organizations can deploy biometric readers at key entry points like main entrances, secure zones, server rooms while still allowing tokens as a fallback. Over time, as staff become comfortable and enrollment databases are built, the reliance on tokens can shrink. The process is evolutionary, not revolutionary, but it represents a profound shift in how buildings verify who is coming and going.
The transition away from tokens is not just theoretical. Innovatrics’ headquarters has been described as the most biometric building in the world. In this environment, staff and visitors can move through doors, elevators, and restricted zones without carrying physical cards or phones. Instead, their identity is verified directly through biometric recognition systems integrated into the building’s infrastructure.
This building demonstrates what a future beyond tokens can look like: secure, seamless, and identity-centric. While tokens may remain as backup options, the default is to verify the person, not the object they carry. For the wider industry, it serves as proof that large-scale biometric deployment is not only feasible but also enhances both security and convenience in everyday operations.


Tokens will likely persist as backups, visitor credentials, or part of multi-factor solutions. For organizations seeking the highest assurance of identity, biometrics represents the new foundation. From global standards to cutting-edge real-world examples like Innovatrics headquarters, the direction is quite clear. In the modern access control industry, identity itself has become the credential.


Biometric Identity Management Solution for Securing Borders



