Proximity Readers Tutorial

By: Brian Rhodes, Published on May 20, 2013

One of the most common credentials is also the most confusing. How exactly do proximity cards 'read' into an electronic access system? Despite being widely used by more than a half-dozen 'contactless credential' types, that these credentials use nothing more than a simple wave in front of a reader can discount just how complex the process is. In this note, we look at 'proximity credentials', how they work, and the technology behind them.

What is 'Prox'

'Prox' is both a brand specific offering from credential giant HID Global, as well as a term to describe a range of contactless RFID credentials that are read close to, but do not touch the reader. The individual data formats of the credentials differ, but these 'contactless' type use the same general technology to authenticate and are composed of the same basic components.

Proximity Types

A few of the best known 'proximity' types are:

  • 125 kHz Prox: Older generation of HID Prox. Proliferation of 'other' 125 kHz RFID chips, costs of manufacturing, and limited storage bits have yielded to 13.56 MHz.
  • 13.56 MHz Prox: Despite a shorter wavelength, the quicker reading speed, increase in storage bits, and decreased amount of copper in antenna offers advantages over older 125 kHz.
  • Desfire MIFARE: Outside the US (HID's strongest market), MIFARE uses a 13.56 MHz based system build to conform to international format standards.
  • Hybrid/Multiclass: These credentials include more than one 'contactless' technology, that may include 125k, 13.56M, or other proprietary RFID chips that may include write/rewrite abilities.

Even though these products operate using the same methods, they are not interchangeable. Like mechanical keys, proximity credentials are read/used in the same basic way, but the format of the information they contain differs. An automobile ignition key is bitted and has a different physical profile than an office door key, but they both must be inserted into a lock to work. Likewise, a Desfire card will not register on a 125 kHz reader, but both credentials use the same mechanics.

The components in the respective formats are tuned for different frequencies; this allows 'muticlass' prox credentials to exist on the same card without interference issues.

Resonant Energy Transfer

How can a plastic card or fob, with no internal battery, powerlessly communicate over an air gap of 3 inches or more? Proximity cards are "passive RFID" elements that rely on some other device to supply power to the credential. At it's core, resonant energy transfer uses minute voltages, wirelessly transferred via a small radio field, and collected by an antenna embedded into a card or fob.

While minute, the field emits sufficient power over a few milliseconds to be stored within the credential. For a familiar demonstration of 'resonant energy transfer', see the short clip below of putting a lightbulb into a microwave:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

In the case of microwaves, the field excites the inert gas inside the bulb and causes it to alight. For proximity credentials, the total energy transfer is much smaller and tightly contained than the dramatic explosions of YouTube clips, but the energizing method works the same, with the credential taking place of the bulb and the card reader supplying power.

Inside Prox Cards

All 'Contactlesss' RFID credential technology uses variations of three basic components, identified in the image below:

  • Antenna Coil: A lengthy fine copper winding, measuring 20' or more, is coiled within the credential and acts as a bidirectional antenna, both receiving (and energizing) the capacitor, but also broadcasting the ICC Chip's information to a reader.
  • Capacitor: This component stores, for a brief period, the energy emitted by the reader. When the capacity of the capacitor is reached, it simultaneously discharges into the ICC Chip and the antenna.
  • ICC Chip: The chip stores the information contained by the credential, including discrete details like facility codes, unique ID numbers, and other static details stored on the card. This information is broadcast to the listening reader via the Antenna Coil.

A key characteristic of this technology is the low power requirements. While the needed electricity falls well beneath human perception, it means the credential must be positioned close to the energy source - the reader. This describes why 'proximity' card must be mere inches away from the reader in order to be activated:

In the case of 'long range' readers, the size of the unit is larger. Because the power of the signal cannot be increased beyond FCC defined limits, the physical size and sensitivity of the reader's antenna must be larger. A typical proximity reader will measure under 2" x 3" x 0.5", a unit built to read credentials from distances up to 6' can measure 10" x 12" x 2".

4 reports cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Favorite Access Control Credentials 2016 on Nov 07, 2016
When it comes to the most popular way to unlock an access controlled door, which credential type holds the favored spot among integrators? The...
The Prox Reader Shootout on Aug 27, 2015
In this report, we put eight readers of the popular 125 kHz contactless format head to head and see which one rises to the top. Over a third of...
Favorite Access Control Credentials 2014 on Jul 11, 2014
When it comes to the most popular way to unlock a door, which access credential type holds the favored spot among integrators? The 'contenders'...
Comments (2) : PRO Members only. Login. or Join.

Related Reports

Hikvision Colorvu Camera Tested on Jun 24, 2019
Hikvision says their new ColorVu line captures "vivid chromatic images in darkness", with unconventional white light illuminations whereas most...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
China / US Trade War Impact Splits Industry on Jun 04, 2019
As the trade war continues to heat up, 170+ integrators told us "What impact will the US / PRC China conflict have on the industry?" Respondents...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...

Most Recent Industry Reports

HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Beats Milestone For IHS #1 on Jun 21, 2019
For years, Milestone has touted that they are the #1 VMS. Now, Genetec has beaten them in IHS rankings. But what is this? Even other manufacturers...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Exacq Remote Cloud Access Tested on Jun 20, 2019
Remote cloud access has been missing from most VMSes (including Exacq and Milestone). Now, Exacq, after releasing Cloud Drive Storage earlier in...
Briefcam Buys Frost Award* on Jun 20, 2019
Frost 'awards' are well-known and widely disrespected. Now Briefcam is touting their win. The way it has worked for many years is that Frost...
IFSEC 2019 Show Report on Jun 19, 2019
The UK's largest trade show, IFSEC, is underway and IPVM has been examining what is new and happening at the show. Inside, we cover: Huawei...
Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Startup Vaion Launching End-to-End AI Solution Backed with $20 Million Funding on Jun 17, 2019
An EU / USA video surveillance startup, Vaion, founded by ex-Cisco Senior Directors is launching an end-to-end VSaaS platform with $20 million in...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact