Proximity Readers Tutorial

By: Brian Rhodes, Published on May 20, 2013

One of the most common credentials is also the most confusing. How exactly do proximity cards 'read' into an electronic access system? Despite being widely used by more than a half-dozen 'contactless credential' types, that these credentials use nothing more than a simple wave in front of a reader can discount just how complex the process is. In this note, we look at 'proximity credentials', how they work, and the technology behind them.

What is 'Prox'

'Prox' is both a brand specific offering from credential giant HID Global, as well as a term to describe a range of contactless RFID credentials that are read close to, but do not touch the reader. The individual data formats of the credentials differ, but these 'contactless' type use the same general technology to authenticate and are composed of the same basic components.

Proximity Types

A few of the best known 'proximity' types are:

  • 125 kHz Prox: Older generation of HID Prox. Proliferation of 'other' 125 kHz RFID chips, costs of manufacturing, and limited storage bits have yielded to 13.56 MHz.
  • 13.56 MHz Prox: Despite a shorter wavelength, the quicker reading speed, increase in storage bits, and decreased amount of copper in antenna offers advantages over older 125 kHz.
  • Desfire MIFARE: Outside the US (HID's strongest market), MIFARE uses a 13.56 MHz based system build to conform to international format standards.
  • Hybrid/Multiclass: These credentials include more than one 'contactless' technology, that may include 125k, 13.56M, or other proprietary RFID chips that may include write/rewrite abilities.

Even though these products operate using the same methods, they are not interchangeable. Like mechanical keys, proximity credentials are read/used in the same basic way, but the format of the information they contain differs. An automobile ignition key is bitted and has a different physical profile than an office door key, but they both must be inserted into a lock to work. Likewise, a Desfire card will not register on a 125 kHz reader, but both credentials use the same mechanics.

The components in the respective formats are tuned for different frequencies; this allows 'muticlass' prox credentials to exist on the same card without interference issues.

Resonant Energy Transfer

How can a plastic card or fob, with no internal battery, powerlessly communicate over an air gap of 3 inches or more? Proximity cards are "passive RFID" elements that rely on some other device to supply power to the credential. At it's core, resonant energy transfer uses minute voltages, wirelessly transferred via a small radio field, and collected by an antenna embedded into a card or fob.

While minute, the field emits sufficient power over a few milliseconds to be stored within the credential. For a familiar demonstration of 'resonant energy transfer', see the short clip below of putting a lightbulb into a microwave:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

In the case of microwaves, the field excites the inert gas inside the bulb and causes it to alight. For proximity credentials, the total energy transfer is much smaller and tightly contained than the dramatic explosions of YouTube clips, but the energizing method works the same, with the credential taking place of the bulb and the card reader supplying power.

Inside Prox Cards

All 'Contactlesss' RFID credential technology uses variations of three basic components, identified in the image below:

  • Antenna Coil: A lengthy fine copper winding, measuring 20' or more, is coiled within the credential and acts as a bidirectional antenna, both receiving (and energizing) the capacitor, but also broadcasting the ICC Chip's information to a reader.
  • Capacitor: This component stores, for a brief period, the energy emitted by the reader. When the capacity of the capacitor is reached, it simultaneously discharges into the ICC Chip and the antenna.
  • ICC Chip: The chip stores the information contained by the credential, including discrete details like facility codes, unique ID numbers, and other static details stored on the card. This information is broadcast to the listening reader via the Antenna Coil.

A key characteristic of this technology is the low power requirements. While the needed electricity falls well beneath human perception, it means the credential must be positioned close to the energy source - the reader. This describes why 'proximity' card must be mere inches away from the reader in order to be activated:

In the case of 'long range' readers, the size of the unit is larger. Because the power of the signal cannot be increased beyond FCC defined limits, the physical size and sensitivity of the reader's antenna must be larger. A typical proximity reader will measure under 2" x 3" x 0.5", a unit built to read credentials from distances up to 6' can measure 10" x 12" x 2".

4 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Favorite Access Control Credentials 2016 on Nov 07, 2016
When it comes to the most popular way to unlock an access controlled door, which credential type holds the favored spot among integrators? The...
The Prox Reader Shootout on Aug 27, 2015
In this report, we put eight readers of the popular 125 kHz contactless format head to head and see which one rises to the top. Over a third of...
Favorite Access Control Credentials 2014 on Jul 11, 2014
When it comes to the most popular way to unlock a door, which access credential type holds the favored spot among integrators? The 'contenders'...
Comments (2) : PRO Members only. Login. or Join.

Related Reports

ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
 Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability.  But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Avigilon Blue VSaaS Tested on Aug 05, 2019
Avigilon says Blue is a "powerful integrator cloud service platform", easy to set up and configure, quickly scale business, by leveraging cloud...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...

Most Recent Industry Reports

Anyvision Facial Recognition Tested on Aug 21, 2019
Anyvision is aiming for $1 billion in revenue by 2022, backed by $74 million in funding. But does their performance live up to the hype they have...
JCI Sues Wyze on Aug 21, 2019
The mega manufacturer / integrator JCI has sued the fast-growing $20 camera Seattle startup Wyze. Inside this note: Share the court...
Dahua 4K Camera Shootout on Aug 20, 2019
Dahua's new Pro Series 4K N85CL5Z claims to "deliver superior images in all lighting and environmental conditions", but how does this compare to...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Uniview Beats Intel In Trademark Lawsuit on Aug 19, 2019
Uniview has won a long-running trademark lawsuit brought by Intel, with Beijing's highest court reversing an earlier Intel win, centered on...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Verkada People And Face Analytics Tested on Aug 16, 2019
This week, Verkada released "People Analytics", including face analytics that they describe is a "game-changing feature" that "pushes the...
Dahua OEM Directory 2019 on Aug 16, 2019
US Government banned Dahua OEMs for dozens of companies. The following directory includes 40+ of those companies with a graphic and links to...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact