Proximity Readers Tutorial

By Brian Rhodes, Published on May 20, 2013

One of the most common credentials is also the most confusing. How exactly do proximity cards 'read' into an electronic access system? Despite being widely used by more than a half-dozen 'contactless credential' types, that these credentials use nothing more than a simple wave in front of a reader can discount just how complex the process is. In this note, we look at 'proximity credentials', how they work, and the technology behind them.

What is 'Prox'

'Prox' is both a brand specific offering from credential giant HID Global, as well as a term to describe a range of contactless RFID credentials that are read close to, but do not touch the reader. The individual data formats of the credentials differ, but these 'contactless' type use the same general technology to authenticate and are composed of the same basic components.

Proximity Types

A few of the best known 'proximity' types are:

  • 125 kHz Prox: Older generation of HID Prox. Proliferation of 'other' 125 kHz RFID chips, costs of manufacturing, and limited storage bits have yielded to 13.56 MHz.
  • 13.56 MHz Prox: Despite a shorter wavelength, the quicker reading speed, increase in storage bits, and decreased amount of copper in antenna offers advantages over older 125 kHz.
  • Desfire MIFARE: Outside the US (HID's strongest market), MIFARE uses a 13.56 MHz based system build to conform to international format standards.
  • Hybrid/Multiclass: These credentials include more than one 'contactless' technology, that may include 125k, 13.56M, or other proprietary RFID chips that may include write/rewrite abilities.

Even though these products operate using the same methods, they are not interchangeable. Like mechanical keys, proximity credentials are read/used in the same basic way, but the format of the information they contain differs. An automobile ignition key is bitted and has a different physical profile than an office door key, but they both must be inserted into a lock to work. Likewise, a Desfire card will not register on a 125 kHz reader, but both credentials use the same mechanics.

The components in the respective formats are tuned for different frequencies; this allows 'muticlass' prox credentials to exist on the same card without interference issues.

Resonant Energy Transfer

How can a plastic card or fob, with no internal battery, powerlessly communicate over an air gap of 3 inches or more? Proximity cards are "passive RFID" elements that rely on some other device to supply power to the credential. At it's core, resonant energy transfer uses minute voltages, wirelessly transferred via a small radio field, and collected by an antenna embedded into a card or fob.

While minute, the field emits sufficient power over a few milliseconds to be stored within the credential. For a familiar demonstration of 'resonant energy transfer', see the short clip below of putting a lightbulb into a microwave:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

In the case of microwaves, the field excites the inert gas inside the bulb and causes it to alight. For proximity credentials, the total energy transfer is much smaller and tightly contained than the dramatic explosions of YouTube clips, but the energizing method works the same, with the credential taking place of the bulb and the card reader supplying power.

Inside Prox Cards

All 'Contactlesss' RFID credential technology uses variations of three basic components, identified in the image below:

  • Antenna Coil: A lengthy fine copper winding, measuring 20' or more, is coiled within the credential and acts as a bidirectional antenna, both receiving (and energizing) the capacitor, but also broadcasting the ICC Chip's information to a reader.
  • Capacitor: This component stores, for a brief period, the energy emitted by the reader. When the capacity of the capacitor is reached, it simultaneously discharges into the ICC Chip and the antenna.
  • ICC Chip: The chip stores the information contained by the credential, including discrete details like facility codes, unique ID numbers, and other static details stored on the card. This information is broadcast to the listening reader via the Antenna Coil.

A key characteristic of this technology is the low power requirements. While the needed electricity falls well beneath human perception, it means the credential must be positioned close to the energy source - the reader. This describes why 'proximity' card must be mere inches away from the reader in order to be activated:

In the case of 'long range' readers, the size of the unit is larger. Because the power of the signal cannot be increased beyond FCC defined limits, the physical size and sensitivity of the reader's antenna must be larger. A typical proximity reader will measure under 2" x 3" x 0.5", a unit built to read credentials from distances up to 6' can measure 10" x 12" x 2".

4 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access...
Favorite Access Control Credentials 2016 on Nov 07, 2016
When it comes to the most popular way to unlock an access controlled door,...
The Prox Reader Shootout - Allegion, AWID, Fairpointe, HID, Honeywell, Rosslare on Aug 27, 2015
In this report, we put eight readers of the popular 125 kHz contactless...
Favorite Access Control Credentials 2014 on Jul 11, 2014
When it comes to the most popular way to unlock a door, which access...
Comments (2) : Members only. Login. or Join.

Related Reports

Vehicle & Long Range Access Reader Tutorial on Jan 21, 2020
One of the classic challenges for access control are parking lots and...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Access Credential Form Factor Tutorial on Feb 10, 2020
Deciding which access control credential to use and distribute, including...
Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Multipoint Door Lock Tutorial on Jan 23, 2020
Despite widespread use, locked doors are notoriously weak at stopping entry,...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see,...
HID Releases Lower-Cost Signo Readers on Mar 06, 2020
HID Global is releasing a new line of readers called Signo they claim read...
Idemia Presents AI Facial Recognition Access Reader on May 18, 2020
Idemia presented its VisionPass AI Facial Recognition Access Reader at the...
Breaking Into A Facility Using Canned Air Tested on Jan 28, 2020
Access control is supposed to make doors more secure, but a $5 can of...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access...
Delayed Egress Access Control Tutorial on Feb 04, 2020
Delayed Egress marks one of the few times locking people into a building is...
Wyze Smart Door Lock Test on Jan 14, 2020
Wyze's inexpensive cameras have grabbed the attention of many in the consumer...

Recent Reports

Panasonic Presents i-PRO Cameras and Video Analytics on Oct 19, 2020
Panasonic presented its i-PRO X-Series cameras and AI video analytics at the...
Augmented Reality (AR) Cameras From Hikvision and Dahua Examined on Oct 19, 2020
Hikvision, Dahua, and other China companies are marketing augmented reality...
18 TB Video Surveillance Drives (WD and Seagate) on Oct 19, 2020
Both Seagate and Western Digital recently announced 18TB hard drives...
Watrix Gait Recognition Profile on Oct 16, 2020
Watrix is the world's only gait recognition surveillance provider IPVM has...
Intel Presents Edge-to-Cloud Ecosystem for Video Analytics on Oct 16, 2020
Intel presented its processors and software toolkit for computer vision at...
Best Manufacturer Technical Support 2020 on Oct 16, 2020
5 manufacturers stood out as providing the best technical support to ~200...
Microsoft Azure Presents Live Video Analytics on Oct 15, 2020
Microsoft Azure presented its Live Video Analytics offering at the September...
Worst Manufacturer Technical Support 2020 on Oct 15, 2020
4 manufacturers stood out as providing the worst technical support to ~200...
Clorox Announces, Then Pulls, Fever Camera on Oct 15, 2020
For almost one week, Clorox was marketing fever cameras. The booming...
Faulty Hikvision Fever Cam Setup at Mexico City Basilica and Cathedral on Oct 14, 2020
Donated Hikvision fever cameras (claiming screening of 1,800 people/min. with...
Directory of 209 "Fever" Camera Suppliers on Oct 14, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Avigilon UMD / UAD Tested on Oct 14, 2020
Avigilon's Unusual Activity Detection and Unusual Motion Detection claim to...
Longse Promoting Hikvision Partner Fullhan Chip Based Cameras on Oct 14, 2020
With Huawei HiSilicon production being shut down at TSMC, camera...
Meridian & Goodview (BEMS Relabeller) Temperature Screening Tested on Oct 13, 2020
A lot of temperature tablets look exactly alike and that is because they use...
Monitoring Alarm Systems From Home - Innovation or Danger? on Oct 13, 2020
Remote monitoring by alarm companies since COVID-19 is bringing cost savings...