Prox vs. iClass Explained

Author: Brian Rhodes, Published on Jul 12, 2013

The differences between 'contactless' proximity credential formats are significant, yet the details are not well understood. Most access designers and users are familiar with 'Prox', but replacing them with 'iClass' has no real benefit... or does it? In this note, we contrast Prox versus iClass formats, and examine the key differences between both. Should you upgrade you Prox system to iClass? We answer that question in this report.

Key Pros and Cons

*** *** ********** ** **** ***** ***:

  • *** ****:*** **** ****** ** (**********) **** ***** ********** ** ***** prices ******** ** ******.
  • "**** ******" ********: ***** ********** ** "********", **** **** ** ********** ********* and **** ***** *** *********** **** ****'* "******** ******* *********".

** ********, *** *** ********** ** ****** ***:

  • ********* ********:****** ****, ****** **** * *** ** ***** ****** ********** of **** ****, *** **** * ****** ****** *** ****** the ******, ******* ** ** ****** * '*****-*****' **********.
  • **** ********: ****** ******** **** ****, *** ************ **** *******, **** Prox. ***** ** ****** **** ** ** ****** **** ** store **** *********** *** * ****** ** ********* ******* ***** from **** ***

Prox ** (*****) ****

******* ***** ********* ** ****** ** '**** ********** *********', *** majority ** *** ****** ******* ********* ********* ***** *** '**** II' ****** ***********. ** * ****** ***** ****** ************ **********, ~75% ** ********* ********* **** ***, ******, ** ******* *** systems **** *** *** *** **** ***********. ***** **** ********* and *** ***** *** ***** ** ***** '***********' ********** *******, many *** ******* ** *** ********** *********** ******* *** *** and ****** ******** ** *** *** **** ****** **** *** familiar ****.

************

* **** **** ** ******'* **** ****** ** * ****** of *** ******* ** ********* **** ********** ** *** *** user *** ****** ***. **** ******* *** '***********' *********** ********* used ** ****** * ****, ***, ** ***** ** ***** proximity ** ** ******. ** **** *******, ** **** ** the *** ******* **** *** ****** ******* ****** *******:

  • **** ******
  • **** *****

**** ******:* **** **** *** ** ****** **** '****' ********* ** an ****** ******* ******. ***** *** **** ******* ** *** credential ** ********* *********** ** *** ****, *** ****** ****** the **** ******* ** ***** *** **** ****** ** *** access ******* **** ***.

**** *****:**** * ********* ***********, ****** ******* ******* ********* **** ****, however ** ******* *** ****** *** **** ***** ** ****. Because ** **** '***********' *********** *** ********* ******* ** *** reader, *** ***** **** ** ***** ** *** ****** ** order ** ****. **** *********** ****** **** **** ****** *** typically ******* *.**" - *.*", ******* ********* ******* **.*" - 24.0" *** ******** **** ****** (******* *******) ***********.

***********

*******, ******* *** ******* *** ******* ** ***-*****, ***** *** many ********* *********** ******* *** ******* *********:

  • *********
  • **********
  • *******
  • ****

*********:*** ****** ******* ********** ******* *** *** *********** ** ************ radio *********, ***** **** ** * *** ********* *** *** and ****** ** **** ********* ** **.** ***. *** ****** frequency ****** ****** ************ ****** *** ******* *********, **** '****' of *********** *** **** ** ** ********* ******* **** *** reader ** * ********* ******* ****** ** ****.

**** *********** ***********, * ***** ** **** ********** ***********. *** kHz ** ******* **** ***** ** ************* **.** ***, *** *** ********* ** **** *** * credential ** **** ** * **** **** ** *******. ******** longer ******* ** * **** ***** ** ********** ** *****, so **** *********** *** ******* ** *** **** ****** ** information **** ********. ** * ******, *** ******* ****** ** bits *** **** ** ********* ** *** ******** ** ****, well ******* *** *** ***, *** *** ** ******* *********** afforded ** *** ****** ********.

*** ****** ********* **** ******** * **** '*****' ***** ****. In **** ************, ********** **********,******* **** ******* ******** ********** ************ ** ******* *** *** ******* **** being ********. ****** ********* ****** ********* ******* ***** ********.

**********:**** *** ************ ** ********* *** *****, ****** ****** ********** against '***-**-***-******' ******* ******* ***** ** ******** *********** *** *** ***********. HID ****** **** *********** ** *********** ******* *******:

"*** ************* ******* ** ****** ****** *** **** ** ********* using ** *********. *** *********** ******* *** **** *** ****** cannot ** “*******” *** ******** ** * ******. *** ********** protocol **** ****** **-*** **** ****** ******* *** ****** **** and ****** **************. (**, **** **** ***** ** *** ****/******)"

* ********** ******** ******* *** *** ******* ** ***** *****. With ****, *** ************ ** ***********. *******, **** ******, *** transmission ** ********* *** **** *** ** ********* ** *** reader **** * ******** '***' ** ****** ** *** **********:

****, **** ***** ***** ******'* *************** *** '***********' ******* ****** ********** *** ******:

*** ********** ******* "****" (**** ** *** "*********" ** *** chart *****) ** * ******* *** ******** **** ****. ****** therefore ******** ** ******** *** '******** ****' ******** ******* ************ ** **** ********* *********** ******** ******** *******.

*******:*** ******* **** ***** *** ********* ** *** **********; ** other *****, ****** ***** ****** ** **** ** **** ******* and **** *****. * **** ****** ****** ******* **** **** to ****** *********** ******* **** ********* ***** ******. *** **** of ** ****** ****** ** ********* **** ********* **** ** Prox ******, *** ******* ***** ***** ***** **% ******.

*******, *** ***** *** **** ********* *** *** **** *** both *******, *** *********** ********* *** * ***** ******* ** installing *** ****** ****** ** *** **** ***** ** *** removed ****. *** *** ****** **** ******* *** **** *** available ** ****** ********, *** ********* ******* *** **** ** 'bolthole-to-bolthole' *******.

******* ******* *** ******** ** ********** *********** **************. ** **** **** **** *********** ******** ******* *** *********, but ****** ********** ********** ** ****** **** **** - ****** than ******* ******** ** ** ****** * *** **** ** once, *** ****** ********* ******* ** **** ******* **** ******* can ** ********.

****:******* * ***** ********** ************* **** **** ****, ****** ********* costs ****. ******* ** *** ********* **********, *** *** *********** need **** **** **** ***** **** **.** *** ** ******* the ***** ********* *****. ****** *********** *** **** ********* ********** than ****, *** ******* ****** ******, *** **** ** *********** is *****. ** ******** *****, *** ******* ******* *** ****** formats ** **** *** **** ******, ******** ** ****** ***** iClass ** ********* ****** ******. *** ***** ***** ***** ******* internet ******* ** ******** *****:

Average ********* **** **********

Prox ********
*****$*.**$*.**
*******$***.**$***.**

Should * *******?

**** ****** *** ******** ** "**** ** ******?" ******, *** stick **** *** **** ********* *** ******** **** ******. ***********, millions ** ********** ****** ******* ******* *** *** ****** ***** day **** ************ ******, ******* ****** ** ***** * ******** risk. *** *********** ** ****, ***** **** *** ********** ****** share, ** *** ** *** ******** ************ **** *** ***.

*******, ** **** ** *** ******** '****** ***', **** ****** has **** *********** ********** *** ******** *********. *** ****-******** ***********, or ***** ***** ***** ** * **** ****** ** ***** identity ******* ******* ** *** ********** (*** ******* ** *****-****** use) *** ****** *** ******** *** ********** ***** ** ****** is *****.

Comments (9)

********* *******. * ***'* ******** *** **** **** * **** a *** *** ****** ***** **** ***** ** *******. **'** been ******* ****** *** ******* ***** *** *** ********. *** clientele ** ********* **** ******** ******** **** **** *** ** don't ** * *** ** *** *** **** ****.

** **** ********* **** *** *** ****** ******* ****** ***** into *** ****** **** *** ********** *** ***** ********* **** as ******* **** ***** **'* ***** ** *** ****** ******* of ******** ****** * ********.

** *********, *** "**********" ******* *** ***** *** ******* ********* migrate **********.

** *** ******* "********* *.*. *********** ************ *******", * ** curious ** ** **** **** ****** ** ******* ******* *** door/wall. ** **** *******, **** ** **** ******** *********?

***** ******* ***** ***** ***.

**** ** * ******* * ****** **** ****** ** * regular *****. ** *** *** *** *** ** ***, ********** and ********* **** ****** **** *** **** ******* **** ******, prox ***** *** ****** * *** ****** ** *** ****** you ***. ** ** *** ****** ** ******** **** ** is ** "*****". ***** ****** **** ** **** * *** deal *** ** **** ***** *** ***'* ****** **** *** or ***.

*****, ******:

*** ******* ***** * '*******' ******** **** *******. *** *** is **** ** *** **** ***** ****, *** **'* **** than **** ********. *******, ** *** *** **** ** ******* a ********* *** ***** **** **** **** ****, *** ****** illustrate *** ******* ** ********** **********.

****** *** *******!

* **** **** ******** *'* **** ** ******* ** **** topic. ****** **** **** ** *** **** **** ****** *****.

*** ******** ******* *** *** ****** **************, *** ** ******** different **** *********. (****** ** ***** ******** **** ******** ******* additional *********)

*** **** ***** **** *** ******** ***********, **** *** **** of *** *** ************** ****** **** *** ****** **** ** easily ******, **** *** ***** ****** *** ** ******* ***. They *** *** ** ****** ** * *** ******** **** (or **** *** **** * ******** **** ******'*). *** *** MiFare ******* *** ******/****** *** *** ** ****** ****** ** new *****.

**** ***** *** ********** ** ******* *** ** ***** **** is ********* **** *** **** *** *****'* ******* *** ** do ** ****** * **** **** ******* **** * ***** reader ** ***** ** *** ******** *******. *** **** **** greater ******** **** *** ** ***** *** * ****** **** than * **.***** **** ******** *** ** ************** **** *** prox **** ** ******* *********. *** ********** ****** ***** **** be **** ** ****** *** ** ****** ** *** ******.

**** ****** **** ***** ************* ********* *** * ******** **** Serial ****** (*****/*****) ****** **** **** **** ******* ******* ** this ** * *** *** ************** ****** *** ********* *****'* allow ****** ** *** *********** *****. *** *** ****** **** the **** **** ****** ****** **** *** ****** ** **** a **** ****. (** *** **** ** *** *********** ***** and ***** *** ***** ********** *** *** **** ** ********** to ********* * **** ****** ****** ** ***** ********* *** will ******** ** ***** * **-*** ************* ****** **** ** encrypted ************** **** ******** *** ******** ******). ****** ** ****** from ******* ** ******** ** *** ***** ** *** ****.

*** ******** ** * ******* ***** ****** ****** ** *** ability ** **** *** ******* ******* ******. * ***** **** any ****** **** ***** * ******* ****** *** **** *** CSN *** **** **** * ****** **** *** ****** **** same *** **** * ******* ******. **** ** ****** ******** physical ****** ** *** **** * *** **** * ****** to **** **** ****** **** *** ****. ** *** ** tamper ********** ****** ** **** ** *** ******* **** **** a ******* ********* ** ***** ** * ****** ** ***** be ********** ******** ** * ******.

***** ****** ******. **** ****** ** ** ***** **** *** being ****** *** ******* ** ** ** ****** * ***** out **** ****** ********* ***** **** ****** *******. *** ***** needing **** ******** ****** *** **** *** ** *****.

***** **** ** *** * ******* ********** ******* ****** *** DesFire

** *** **.** *** ***** ***** *** ********* ********* ********. In ** ** ****** *** *** *** ****** *** *** new ****** ****** **, ** ****** ** ** *** ******* Mifare *** *** **** ******** ******* ******* *** **** ** popular *** ** ***** ** ** *** **** ******. **** we **** ** *** *** *****, ****** ** *** ****** and ******* ******* ** *** ****** ** ******** **** *** "compliant" **** *** **** *** ******** *** *** *** ***** interoperable. ********* *** *** ****** ****** **** **** **** *** CSN (**** ****** ******) ** * ****** ** ******* **** not ***** **** ** **** *** ****** ****** ******* *** credential ***********

**** ** **** ********** *******, ** ** *********** ** ********** requirement ** ********* *********** *** ******* ***** * ******** *** use ***/*** **** ***** **** ** ***** ******* **** ****** the ******* ***** ** ***** *** ***********. *** *** ********** requires ********** ** ******** *********** ** ***** ** * **** to *** **** *** **** ***** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Mobile Credentials (BLE / NFC / Apps) Guide on Sep 30, 2016
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...
Access Door Controller Configuration Guide on Sep 27, 2016
Properly configuring access control door controllers is key to a professional system. These devices have fundamental settings that must be...
VLANs for Video Surveillance Tutorial on Sep 26, 2016
Many people confidently say to 'use VLANs' as an answer to IP video networking problems and as a way to signal expertise. But how should VLANs be...
Access Control Course Fall 2016 on Sep 22, 2016
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Door Fundamentals For Electronic Access Control on Sep 20, 2016
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
How to Measure Video Quality / Compression Levels on Sep 16, 2016
Two cameras have the same resolution, frame rate and scene monitored but camera A consumes half the bandwidth than camera B. Is Camera A better?...
PTZ Camera Guide 2016 on Sep 15, 2016
Pan/Tilt/Zoom cameras remain critical parts of many surveillance systems, especially in large security operations. Because of this it is important...
The Passback Problem on Sep 14, 2016
Every security system has flaws, even high-tech ones. While Electronic Access Control helps keep sensitive areas safe, it is not without...
S2 Founder Touts Mercury Board To Replace Software House on Sep 08, 2016
Access control is a stoic market typically devoid of glitzy, flashy product releases. But one new product is notable because of who is touting it...
Lenel Partners Angry, Lenel Does Not Care on Sep 01, 2016
Even more than Arecont, one manufacturer stands out for consistent complaints - Lenel. Over the past few years, no manufacturer has had more...

Most Recent Industry Reports

Arecont To Release Industries' Best H.265 Support on Sep 30, 2016
Go big, or go home. That seems to be Arecont's philosophy for H.265, they say they are working on the "best" H.265 implementation in the...
Wall Street Journal Runs Report on Dahua Hack on Sep 30, 2016
The Wall Street Journal is bringing attention to the massive Dahua attack we reported on Tuesday. In an Thursday article entitled, "Hackers Infect...
Dahua USA CEO Tim Wang, Where Is Your Integrity? on Sep 29, 2016
Dahua USA CEO Tim Wang and Dahua Director of Marketing Tim Shen shared their IPVM passwords extensively, resulting in Dahua USA CEO's account...
Allegion NDE Wireless Lock Examined on Sep 29, 2016
While wireless locks are one of the hottest areas of access control, two of its biggest challenges are high cost and limited integration with...
The 'Last Chance to Save' On Hikvision Is Here on Sep 29, 2016
It is over. After at least 8 across the board price cuts in the past 10 months, including an unprecedented back to back 20% off, Hikvision has...
Camera Calculator Class and IPVM Member Orientation October 2016 on Sep 28, 2016
Members, learn how to better design video surveillance systems and get the most out of your IPVM memberships with 2 upcoming live classes. Both...
Axis 4MP Camera Tested (M3046-V) on Sep 28, 2016
Axis has brought 4MP to its camera line in the new M3046-V, the highest resolution model in their revamped M30 series. We bought and tested this...
Hiring Spree At Aimetis 6 Months After Being Acquired on Sep 28, 2016
Aimetis was acquired in April 2016, and is now expanding almost all of their departments, hiring employees from Axis and other industry...
Hikvision Chairman Tours With Chinese Government Boss on Sep 28, 2016
Two China Communist senior officials toured Europe this summer, one was Hikvision's Chairman and the other was his boss, SASAC Director. In this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact