Proximity Readers Tutorial

Author: Brian Rhodes, Published on May 20, 2013

One of the most common credentials is also the most confusing. How exactly do proximity cards 'read' into an electronic access system? Despite being widely used by more than a half-dozen 'contactless credential' types, that these credentials use nothing more than a simple wave in front of a reader can discount just how complex the process is. In this note, we look at 'proximity credentials', how they work, and the technology behind them.

What is 'Prox'

'****' ** **** * ***** ******** ******** **** ********** ******** ******, ** **** ** * **** ** ******** * ***** of*********** **** *********** **** *** **** ***** **, *** ** *** ***** *** reader. *** ********** **** ******* ** *** *********** ******, *** these '***********' **** *** *** **** ******* ********** ** ************ and *** ******** ** *** **** ***** **********.

Proximity *****

* *** ** *** **** ***** '*********' ***** ***:

  • *** *** ****: ***** ********** ** *** ****. ************* ** '*****' *** kHz **** *****, ***** ** *************, *** ******* ******* **** have ******* ** **.** ***.
  • **.** *** ****: ******* * ******* **********, *** ******* ******* *****, ******** in ******* ****, *** ********* ****** ** ****** ** ******* offers ********** **** ***** *** ***.
  • ******* ******: ******* *** ** (***'* ********* ******), ********** * **.** *** ***** ****** ***** ** ******* ** international ****** *********.
  • ******/**********: ***** *********** ******* **** **** *** '***********' **********, **** may ******* ****, **.***, ** ***** *********** **** ***** **** may ******* *****/******* *********.

**** ****** ***** ******** ******* ***** *** **** *******, **** are *** ***************. **** ********** ****, ********* *********** *** ****/**** in *** **** ***** ***, *** *** ****** ** *** information **** ******* *******. ** ********** ******** *** ** ****** and *** * ********* ******** ******* **** ** ****** **** key, *** **** **** **** ** ******** **** * **** to ****. ********, * ******* **** **** *** ******** ** a *** *** ******, *** **** *********** *** *** **** mechanics.

*** ********** ** *** ********** ******* *** ***** *** ********* frequencies; **** ****** '*********' **** *********** ** ***** ** *** same **** ******* ************ ******.

Resonant ****** ********

*** *** * ******* **** ** ***, **** ** ******** battery, *********** *********** **** ** *** *** ** * ****** or ****? ********* ***** *** "******* ****" ******** **** **** on **** ***** ****** ** ****** ***** ** *** **********. At **'* ****, ******** ****** ******** **** ****** ********, ********** transferred *** * ***** ***** *****, *** ********* ** ** antenna ******** **** * **** ** ***.

***** ******, *** ***** ***** ********** ***** **** * *** milliseconds ** ** ****** ****** *** **********. *** * ******** demonstration ** '******** ****** ********', *** *** ***** **** ***** of ******* * ********* **** * *********:

** *** **** ** **********, *** ***** ******* *** ***** gas ****** *** **** *** ****** ** ** ******. *** proximity ***********, *** ***** ****** ******** ** **** ******* *** tightly ********* **** *** ******** ********** ** ******* *****, *** the ********** ****** ***** *** ****, **** *** ********** ****** place ** *** **** *** *** **** ****** ********* *****.

Inside **** *****

*** '************' **** ********** ********** **** ********** ** ***** ***** components, ********** ** *** ***** *****:

  • ******* ****:* ******* **** ****** *******, ********* **' ** ****, ** coiled ****** *** ********** *** **** ** * ************* *******, both ********* (*** **********) *** *********, *** **** ************ *** ICC ****'* *********** ** * ******.
  • *********:**** ********* ******, *** * ***** ******, *** ****** ******* by *** ******. **** *** ******** ** *** ********* ** reached, ** ************** ********** **** *** *** **** *** *** antenna.
  • *** ****:*** **** ****** *** *********** ********* ** *** **********, ********* discrete ******* **** ******** *****, ****** ** *******, *** ***** static ******* ****** ** *** ****. **** *********** ** ********* to *** ********* ****** *** *** ******* ****.

* *** ************** ** **** ********** ** *** *** ***** requirements. ***** *** ****** *********** ***** **** ******* ***** **********, it ***** *** ********** **** ** ********** ***** ** *** energy ****** - *** ******. **** ********* *** '*********' **** must ** **** ****** **** **** *** ****** ** ***** to ** *********:

** *** **** ** '**** *****' *******, *** **** ** the **** ** ******. ******* *** ***** ** *** ****** cannot ** ********* ****** *** ******* ******, *** ******** **** and *********** ** *** ******'* ******* **** ** ******. * typical ********* ****** **** ******* ***** *" * *" * 0.5", * **** ***** ** **** *********** ************* ** ** *'*** ******* **" * **" * *".

Comments (2)

*****, **** ***** *** ***** *** **** *****. ** *** well ** * **** **** ** ******* ********* **** ***** of **.*** ** ****** (****** ******) *** *********** ************ ** well ** ****** ******** ** **** ***** ** ****** ******.

**** ****** ** ***** * ****** ***** ** *********** **** after ** ***** **** ***** ************ ** **.***** ******** ** market **** ****** **% ** *** ***** (*** **********) ****** low ********* ******** **** *****. * *** ** *** **** lifecycle ** ****** *******.

*********** **** ****** *** *** **** ******** *** ****** ****** and **** **** *********** ******** ** **** **** ******* *** only ***/***!! **** **** **** *** *****'* **** *** ***** should ***** ***** ****** ****** *** **** ********.

****** *****.

***** ******* *****. ******** **** ***** *** *********** ** **** technologies, *'* *** ********** ** ******** ********* ** **** ******** questions

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nvidia For Video Surveillance Examined on Aug 23, 2017
Nvidia is making a big push into the security market, claiming more than 50 partners, investing heavily in industry events, positioning their GPUs...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
Rebooting IP Camera Statistics And Practices on Aug 10, 2017
Dahua cameras automatically reboot weekly, by default. Is this an innovation by the Chinese mega-manufacturer or a sign of a problems? 125...
Competing Against G4S on Aug 09, 2017
G4S Secure Solutions is a global company, operating in multiple countries and offering a suite of products and services from guards to their AMAG...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released Profile C for access control, but in the 3 years since, only 2 companies...
Access Control Commissioning / Install Checklist on Aug 03, 2017
This 80+ point checklist helps end users, integrators and consultants verify that access control installation is complete. It covers the following...
Super Low Light Surveillance Guide on Aug 01, 2017
At the beginning of this decade, low light performance of megapixel cameras was generally terrible. This was the era of super slow shutter where...
IR Surveillance Guide on Jul 31, 2017
Infrared (IR) has become an increasing core component to video surveillance systems. In particular, the expansion of integrated IR cameras that...
Startup Strops Completely Wireless Surveillance Camera Examined on Jul 28, 2017
European startup Strops has developed a surveillance camera that offers up to 6 days of runtime and cellular communications to create a fully...

Most Recent Industry Reports

Nvidia For Video Surveillance Examined on Aug 23, 2017
Nvidia is making a big push into the security market, claiming more than 50 partners, investing heavily in industry events, positioning their GPUs...
China Threatens Reducing Exports to the USA on Aug 23, 2017
The US government has launched a probe into China's alleged theft of US intellectual property. The Chinese government has fired back, threatening...
FLIR Restructures Security Division on Aug 22, 2017
FLIR's goal was once to have a single end-to-end security solution. However, FLIR's Security business unit has been struggling, with several areas...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...
IP Camera Cabling Testing Statistics on Aug 22, 2017
Test and certify, or crimp and pray? Some integrators certify every cable they run, while others only inspect cables that have video issues. 130...
Dahua 4K IR PTZ Tested on Aug 21, 2017
4K has made its way to IR PTZs. In this report, we examine the Dahua 6AE830VNI, a 4K PTZ with 30x optical zoom, 200m (~650') integrated IR, and...
Top Used License Plate Capture Cameras on Aug 21, 2017
Capturing license plates is a common video surveillance application. But what cameras do integrators mostly commonly used? Special purpose LPC...
VLAN For Video Surveillance Usage Statistics on Aug 21, 2017
VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used? 125+ integrators told us how...
Avigilon CEO Attacks Asian Companies Cyber Insecurity on Aug 18, 2017
Avigilon CEO is taking aim at their Asian competitors. And he is going directly after these company's cyber security issues. In this note, we...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact