Fact-checked by Grok 2 weeks ago

Proximity card

A proximity card, also known as a prox card, is a that employs (RFID) technology to transmit data wirelessly to a compatible reader without requiring physical insertion or contact. Operating at a of 125 kHz, it functions passively by drawing power from the reader's to send a —typically just a numerical code—over a short distance of a few inches to centimeters. This identifier links to a secure database for verification, making proximity cards a foundational tool in systems. Proximity cards were developed in the late 1980s by , a leading provider of secure identity solutions, as an advancement over earlier magnetic stripe cards. They gained widespread adoption throughout the due to their enhanced durability, resistance to physical wear, and user convenience in high-traffic environments. The technology adheres to industry standards for low-frequency RFID, including compatibility with Wiegand protocols for integration with various panels. Early models, such as the HID ProxCard II, introduced a compact made from PVC or composite materials, allowing for customization with printing, magnetic stripes, or anti-counterfeiting elements like holograms. Key features of proximity cards include their read-only capability, which limits onboard data storage to prevent tampering, and a consistent read range that ensures reliable performance without line-of-sight requirements. Unlike higher-frequency RFID variants (e.g., 13.56 MHz), proximity cards prioritize simplicity and cost-effectiveness over extended range or read/write functions, making them suitable for basic . They are engineered for robustness against environmental factors, such as dust and mechanical stress, and can be formatted to support corporate numbering schemes for large-scale deployments. Modern iterations often combine proximity technology with advanced features, like iCLASS integration, to bridge legacy systems with contemporary security needs. Proximity cards are predominantly used for physical access control in commercial buildings, government facilities, and secure sites, where they enable quick entry via doors, gates, or elevators. Additional applications include network logins, cashless vending, and time-and-attendance tracking, underscoring their role in streamlining secure operations across industries. While effective for low-to-medium security contexts, their passive nature and limited encryption have prompted ongoing enhancements to address potential cloning risks in high-stakes environments.

Introduction

Definition and key features

A proximity card, also known as a prox card, is a contactless RFID card that uses radio-frequency identification (RFID) technology to enable short-range identification and access control without physical insertion into a reader. These cards operate primarily in the low-frequency (LF) band at 125 kHz, transmitting basic identification data such as a facility code and unique serial number to a compatible reader via electromagnetic induction. Common data formats include the 26-bit Wiegand standard, which encodes an 8-bit facility code, a 16-bit card serial number, and parity bits for error checking, or the 37-bit format used in some variants for expanded addressing. Passive proximity cards, the most prevalent type, require no internal battery and derive power from the reader's electromagnetic field during activation. Key features of proximity cards include a typical read range of 1-15 cm, though this can extend up to 50 cm in optimized setups with higher-power readers, making them suitable for close-proximity applications like door access. They are read-only devices that do not support or complex processing, distinguishing them from higher-frequency technologies such as 13.56 MHz high-frequency () NFC or smart cards (e.g., ), which enable , bidirectional communication, and onboard memory for applications like payments. In contrast to ultra-high-frequency (UHF) RFID systems operating around 900 MHz, which offer longer ranges (up to several meters) for inventory tracking, proximity cards prioritize simplicity and low cost over extended distance or security features. Physically, proximity cards adhere to ISO 7810 ID-1 specifications for credit card-sized formats (85.6 mm × 53.98 mm × 0.76 mm), but also come in clamshell (rugged rectangular enclosures) or key fob designs for durability in industrial settings. These cards are typically constructed from (PVC) or composite materials to withstand environmental exposure. Internally, they consist of a simple (IC) for data modulation, a to form a resonant with the , and an embedded copper or aluminum coil that captures the reader's 125 kHz signal. This minimalist ensures reliability and low costs, with passive operation allowing indefinite lifespan without power source replacement.

Historical development

The development of proximity card technology represents a significant evolution in access control, transitioning from mechanical keys prevalent before the 1970s to electronic credentials that enabled contactless identification. The foundational concept emerged from early RFID innovations, with inventor Charles Walton receiving a U.S. patent in 1973 for an RFID-based system using a passive to unlock doors without physical contact, marking the first practical application of for proximity-based access. In the late 1980s, proximity cards were specifically developed as low-frequency RFID solutions for secure , building on this early work to provide durable, easy-to-use alternatives to magnetic cards, which were prone to wear and required swiping. Commercialization accelerated through Hughes Identification Devices, a subsidiary of established in 1991 to advance RFID technologies, leading to the launch of HID Prox cards around 1992 using 125 kHz operation derived from prior aircraft parts-tracking applications. The technology gained widespread popularity in the 1990s, driven by its convenience in corporate and government facilities, where it replaced cumbersome magnetic stripe systems and integrated seamlessly with the Wiegand protocol—a data transmission standard developed in the for interfaces. HID dominated the market, but competitors like AWID (established in the mid-) and Indala (pioneering 125 kHz formats in the late ) introduced compatible formats, fostering broader adoption and . By the early 2000s, proximity cards had reached peak usage in high-security environments, but by the 2010s, they were increasingly viewed as legacy technology owing to vulnerabilities like easy cloning, prompting shifts toward more secure alternatives.

Types of Proximity Cards

Passive cards

Passive proximity cards are a subtype of low-frequency RFID technology that operate without an internal power source, relying instead on from the reader's to activate and transmit data. These cards typically function at 125 kHz, where the reader's alternating induces a current in the card's , powering its microchip to modulate and backscatters a to the reader. This design eliminates the need for batteries, making the cards simpler and more compact than active variants. The typical read range for passive proximity cards is 1 to 15 , though it can extend up to 20 with optimized reader antennas and environmental conditions, rendering them ideal for close-proximity applications such as door access control. Common formats include the HID 26-bit (H10301) and 37-bit (H10302) Wiegand protocols, which encode codes and card serial numbers for identification. These cards are often constructed from durable (PVC) material in standard CR-80 size, allowing for easy customization with printed graphics, employee photos, or barcodes on one or both sides. Key advantages of passive proximity cards include their low production cost, often under $1 per unit in bulk quantities, and an effectively unlimited lifespan due to the absence of battery degradation, enabling millions of read cycles without maintenance. Their lightweight and robust construction—typically weighing around 7 grams—supports high-volume, everyday use in demanding environments. They dominate legacy systems for building entry and are widely used as corporate badges, providing reliable, contactless in settings like offices and facilities. However, passive cards have inherent limitations, including a shorter operational range compared to battery-powered alternatives and increased susceptibility to from nearby metal surfaces, which can detune the and reduce read reliability.

Active cards

Active proximity cards incorporate a small internal to power their circuitry, amplifying the signal and reducing reliance on the reader's for activation. This design enables more robust communication at 125 kHz, while maintaining compatibility with proximity standards. The , typically a compact type, provides a lifespan of 2 to 5 years, varying based on and environmental conditions. These cards operate effectively at 125 kHz, achieving read ranges up to 2 meters, which supports hands-free operation in access scenarios. Unlike passive cards that depend entirely on inductive powering from the reader, active cards offer enhanced reliability in environments with obstructions or interference. Active proximity cards at 125 kHz are specialized and less common than passive types, primarily used for niche applications like vehicle access. The primary advantages include longer read distances that facilitate hands-free use and improved performance in harsh conditions, such as metallic surroundings or adverse weather. They are employed for large-area gate access in parking facilities or campuses, where their thicker form factor—due to the integrated battery—accommodates vehicle mounting, such as with HID ProxPass tags. However, active cards carry limitations, including higher costs ranging from $5 to $20 per unit in bulk production, a bulkier profile that may not suit slim card formats, and the need for periodic replacement upon depletion. In contemporary deployments, 125 kHz active proximity cards remain niche, with many systems upgrading to higher-frequency technologies for broader range and integration with modern infrastructure.

Operational Mechanism

Energy supply and activation

Proximity cards, particularly passive variants operating at 125 kHz, rely on to receive energy from a nearby reader device. The reader generates an alternating radiofrequency (RF) field through its antenna coil, typically at 125 kHz, which induces a voltage in the card's coil via based on Faraday's law of . This functions like a weakly coupled , where the time-varying from the reader penetrates the card's , enabling energy transfer without physical contact. The card's is integrated into an resonant , consisting of an (the ) and a , precisely tuned to the reader's 125 kHz for maximum . This maximizes the induced and voltage in the , with typical inductance values around 1-2.5 mH paired with capacitors of 600-1000 pF to achieve the required tuning. The harvested () voltage, often reaching 10-32 V peak-to-peak depending on field strength, is rectified to () to temporarily power the card's () for milliseconds during interaction. Passive cards draw minimal power, approximately 10 µW (5 µA at 2 V), sufficient for basic operations like data without onboard . Activation occurs when the card enters the reader's RF field and the induced voltage surpasses a , typically around 10 V peak-to-peak, triggering the IC to become operational. The system operates in the near-field regime, where distances are much smaller than the signal's of approximately 2.4 km (calculated as c/f, with c = 3 × 10^8 m/s and f = 125 kHz), ensuring localized and minimizing . This near-field limitation confines effective ranges to a few centimeters to inches. In variations involving active proximity cards, a small (such as a CR2032 ) provides primary power to amplify the response signal, extending range beyond passive limits, though the card still synchronizes timing with the reader's 125 kHz field for communication.

Data encoding and transmission

Proximity cards store identification data in fixed binary formats within the of their (IC), typically consisting of a facility code to identify the issuing and a unique for individual identification. The most widely used format is the open 26-bit H10301 standard, which includes 1 leading even , an 8-bit facility code (ranging from 0 to 255), a 16-bit number (ranging from 0 to ), and 1 trailing odd , enabling up to 16.7 million unique combinations across facilities. Another common format is the 37-bit HID ProxII (H10304), featuring 1 leading even , a 16-bit facility code (0 to ), a 19-bit number (0 to 524,287), and 1 trailing odd , supporting over 34 billion unique codes for larger-scale deployments. To wirelessly transmit this data, the card modulates the generated by the reader through load modulation, where the card's varies its internal load (e.g., by switching a across the antenna coil) to alter the field's , , or , creating detectable changes that the reader interprets as . Common modulation methods at the 125 kHz carrier include (ASK), where data bits are represented by changes in signal (e.g., full for '0' and reduced for '1'), and (FSK), which shifts the subcarrier (e.g., between 12.5 kHz for '1' and 15.625 kHz for '0'). (PSK) is also employed in some systems, using 180-degree shifts to encode bits. Once powered by the reader's field, the card initiates transmission by backscattering its encoded data in a predefined sequence, typically starting with a header or for , followed by the facility code, card ID, and bits, all within or biphase encoding to ensure and DC balance. The reader demodulates these modulated field variations to extract the bit stream, completing the read in short bursts lasting approximately 100-150 milliseconds. This relies on basic error detection via the included bits, which verify overall bit integrity (even parity across the first half and odd across the second), though legacy proximity systems lack advanced cyclic redundancy checks () or . Due to the low-frequency 125 kHz operation and simple schemes, proximity cards achieve limited rates of 1-4 kbps, making them suitable only for transmitting compact codes rather than larger files or complex payloads.

Standards and Compatibility

Relevant ISO standards

Proximity cards, as a of identification cards, adhere to several (ISO) and (IEC) standards that govern their physical characteristics, interfaces, and related technologies, ensuring consistency in design and performance. The primary standard for physical dimensions is ISO/IEC 7810, which defines the ID-1 commonly used for proximity cards, measuring 85.6 mm in width by 54 mm in height with a nominal thickness of 0.76 mm, and specifies requirements for materials, construction, and durability to withstand environmental stresses such as bending, chemicals, and temperature variations. This standard applies to the card body, allowing proximity cards to integrate seamlessly with existing cardholder systems like wallets or readers designed for card-sized media. While proximity cards operate contactlessly, they draw from ISO/IEC 7816, a series of standards for cards that primarily addresses electrical contacts but influences hybrid proximity cards combining contact and contactless elements. Specifically, ISO/IEC 7816-2 outlines the physical interface and test methods for contacts, which proximity cards adapt by omitting physical connectors while maintaining compatibility for edge designs in dual-interface variants, ensuring electrical signaling aligns with broader ecosystems. This adaptation supports interoperability in applications where cards may include both proximity RFID and contact-based chips. Related RFID standards include , which define code structures and air interface protocols for in animal tagging at 134.2 kHz, a close to the 125 kHz used in many proximity cards; however, basic 125 kHz proximity cards lack a dedicated ISO standard for their core RFID operations, resulting in reliance on proprietary formats from manufacturers. Frequency allocation for 125 kHz proximity cards falls under ITU-R recommendations for the , Scientific, and Medical (ISM) band, permitting unlicensed global operation in the 9–135 kHz range to facilitate short-range without regulatory interference. Compliance testing for proximity cards emphasizes () to promote and prevent interference. These tests ensure that proximity cards function reliably in diverse electromagnetic environments, such as near other RFID systems or electronic devices, without compromising transmission accuracy.

Proprietary formats and protocols

Proximity card systems often rely on vendor-specific formats that encode in fixed bit lengths, typically ranging from 26 to 64 bits, with the data transmitted in an unencrypted manner to prioritize speed over . One of the most widely adopted formats is the HID 26-bit standard (H10301), which structures into two bits, an 8-bit facility code to designate the site or organization, and a 16-bit for unique user , supporting up to 65,536 possible numbers per facility. HID's ProxII format extends this to 37 bits (H10302), incorporating additional bits for enhanced capacity while maintaining with Wiegand interfaces, as seen in credentials like the ISOProx II . Similarly, AWID's 26-bit format mirrors the HID structure for broad reader but is tailored for AWID systems, using the same , facility, and breakdown to enable seamless integration in setups. Communication protocols in proprietary proximity systems facilitate data transfer from the card to the reader and then to the controller, with Wiegand emerging as the de facto 26-bit standard for reader-to-controller signaling due to its simplicity and widespread adoption since the 1980s. This protocol uses two wires to transmit serial data—one for the "data 0" line and one for "data 1"—pulsing high or low to represent bits, commonly supporting the 26-bit format but extensible to higher lengths. Some systems employ magstripe emulation, where proximity cards mimic the ABA Track II magnetic stripe format to interface with legacy readers, outputting clock-synchronized data pulses that replicate a physical swipe for backward compatibility. Additionally, the Clock/Data protocol provides variable bit rates by generating a continuous clock signal alongside data pulses, allowing flexible transmission rates suited to custom proximity implementations without fixed timing constraints. Interoperability remains a significant challenge in proprietary formats, as vendor lock-in restricts cross-compatibility; for instance, standard HID readers cannot natively process Indala proximity cards without specialized multi-technology adapters or readers that support both formats simultaneously. This fragmentation arises from unique encoding schemes and bit structures unique to each manufacturer, complicating system expansions or migrations. To address these issues, the Open Supervised Device Protocol (OSDP), developed by the Security Industry Association, is a widely adopted that enables secure, bidirectional communication between readers and controllers, supporting proprietary card formats while adding and remote management capabilities for upgraded . Data encoding in these formats commonly uses self-clocking schemes like or biphase to ensure reliable synchronization without a separate clock line, as the signal transitions within each bit period allow the receiver to extract both timing and data. Manchester encoding represents a logical 0 as a low-to-high transition and a 1 as high-to-low in the bit's midpoint, prevalent in protocols like EM4100 for 125 kHz proximity cards. Biphase encoding, a variant, guarantees a transition at the start of each bit with an optional mid-bit flip for data distinction, enhancing noise immunity in RFID environments. Transmission speeds for these schemes typically operate at around 4 kbps over the 125 kHz carrier frequency, balancing read range and reliability in short-distance applications. Legacy proprietary formats pose scalability limitations due to their fixed bit structures, which cap the number of unique identifiers and hinder integration with larger or multi-site deployments, often necessitating full system overhauls for growth. Modern proximity installations are increasingly migrating to IP-based protocols, such as OSDP over Ethernet, to enable networked , remote diagnostics, and higher data throughput while preserving compatibility with existing card inventories during transitions.

Applications and Uses

Primary applications in access control

Proximity cards serve as a foundational for securing physical entry points in buildings and facilities, enabling controlled to doors, gates, and restricted areas through integration with electronic readers, controllers, and locking mechanisms. When a user presents the card within the reader's detection range—typically 2 to 6 inches—the embedded RFID tag transmits a to the reader, which relays the data to a central controller for verification against authorized permissions. If validated, the controller signals the lock to disengage, granting entry; otherwise, is denied, often triggering an alert. This process supports zoned permissions, allowing administrators to assign varying access levels, such as full employee privileges for operational areas versus limited visitor to lobbies or common spaces, thereby enhancing operational security without physical key distribution. Key system components include the proximity cards themselves, paired with specialized readers such as wall-mounted or narrow models designed for frames, which interface with control panels using the Wiegand protocol—a standard for transmitting credential data over wired connections. The , operating at 26-bit or 37-bit formats, ensures reliable communication between the reader and controller, facilitating seamless integration into broader management software. These components form a robust for , where readers are strategically placed at entry points to monitor and regulate . In environments, proximity card systems demonstrate high , supporting deployments for thousands of users across multi-site facilities by allowing easy addition of cards, readers, and networked controllers without hardware overhauls. Comprehensive trails are a core feature, logging each entry and exit event with timestamps, user IDs, and locations to enable reporting, incident investigations, and usage . Widely adopted in legacy systems—particularly those installed before 2010—proximity cards remain prevalent in sectors like office buildings for employee ingress, hospitals for securing patient wards and pharmacies, and data centers for protecting server rooms. To bolster layered security, proximity systems integrate with for visual verification of access events and systems to notify personnel of unauthorized attempts or forced entries. Anti-passback functionality further prevents by requiring a valid before re-entry with the same , enforcing single-user in high-security zones. These integrations create a cohesive framework, particularly suited for passive proximity cards in close-range applications.

Secondary and emerging uses

Proximity cards find application in time and systems, where employees clock in and out at workstations by presenting the to a reader, enabling automated tracking of work hours and integration with software for shift . This use leverages the cards' contactless nature to streamline processes in workplaces, such as hospitals or offices, reducing manual entry errors. In cashless payment scenarios, proximity cards facilitate low-value transactions at vending machines in settings like cafeterias or gyms, where users tap the card for purchases limited by the cards' data capacity of typically 64-128 bits. These systems, often operating at 125 kHz, allow for quick deductions from pre-loaded balances, though adoption has waned in favor of higher-capacity alternatives. For asset and library management, proximity cards serve as tags attached to equipment or books, enabling short-range scanning for inventory checks and location tracking within facilities. In libraries, this supports efficient check-in/out processes by reading multiple items simultaneously at gates, while in asset tracking, it aids in monitoring tools or materials in warehouses with read ranges up to 10-15 cm. Proximity cards are used in parking systems for automated vehicle gate access in controlled lots, typically with short-range readers where vehicles approach closely. Active variants at 125 kHz can extend the read range slightly for low-speed applications. As of 2025, emerging uses include hybrids with for smart lockers, where proximity cards unlock compartments in environments like schools or gyms, integrating with networked systems for real-time status updates. However, overall deployment is declining due to the shift toward technologies offering greater data capacity and security, confining proximity cards to low-security legacy setups.

Security Aspects

Vulnerabilities and risks

Proximity cards operating at 125 kHz transmit their unique identifiers in plain text without encryption, allowing attackers to easily intercept the data using inexpensive handheld readers such as the Proxmark3 device. This lack of encryption enables cloning attacks, where the entire card data can be duplicated in seconds using sniff-and-write tools, as the systems rely solely on the unique ID for authentication without additional verification mechanisms. Modern devices like the Flipper Zero have popularized such cloning, exacerbating risks as of 2025. Skimming and eavesdropping are prevalent risks, with card data readable from distances of up to 50-60 cm when using specialized signal amplifiers, facilitating replay attacks where intercepted signals are retransmitted to mimic the card's presence and grant unauthorized . Physical risks include indefinite granted by lost or stolen cards until manual , which can involve delays in updating access lists, while exploits allow unauthorized individuals to follow legitimate users through secured entry points without their own credentials. As of early 2025, proximity card technology is classified as a high-risk , with approximately 20-30% of physical systems still relying on these vulnerable 125 kHz cards, contributing significantly to security breaches primarily through . Other threats encompass relay attacks via rogue readers that intercept and relay communications between the card and legitimate reader, while hybrid cards combining 125 kHz proximity with elements remain susceptible to NFC-specific exploits like relay attacks.

Security enhancements and best practices

To enhance the security of proximity card systems, implementing (MFA) is a recommended approach, combining card possession with additional verification methods such as personal identification numbers (PINs), scans like fingerprints, or one-time tokens to ensure that access is granted only to authorized individuals beyond mere physical possession of the card. This layered verification significantly reduces the risk of unauthorized entry, as outlined in NIST guidelines for RFID systems, which emphasize integrating RFID with passwords, PINs, or for robust . Upgrading to hybrid proximity cards, such as HID iCLASS models, provides enhanced by incorporating a secure 13.56 MHz high-frequency layer alongside the traditional 125 kHz proximity functionality, enabling advanced cryptographic protections like AES-128 to safeguard data transmission and storage against interception. These hybrid cards support and checks, making them suitable for high-security environments transitioning from legacy proximity systems. System hardening involves adopting the Open Supervised Device Protocol (OSDP) for communications between readers and controllers, which employs AES-128 encryption and bi-directional authentication to prevent and tampering on wired or links, outperforming older protocols like Wiegand. Additionally, conducting regular security audits and implementing immediate deactivation procedures for lost or stolen cards—through centralized management systems—ensures prompt revocation of access privileges, minimizing exposure windows. Key best practices include deploying shielded readers with electromagnetic barriers to limit the effective read range and reduce skimming vulnerabilities, thereby constraining unauthorized signal capture to within intended proximity. Organizations should also minimize stored card data to essential identifiers only, avoiding sensitive , and pursue phased migrations to NFC-enabled mobile credentials, aligning with 2025 industry standards for contactless, secure alternatives that support dynamic encryption. For ongoing monitoring, integrating intrusion detection systems to flag anomalous read patterns—such as unusual frequencies or locations—enables proactive threat response, while ensuring compliance with data protection regulations like GDPR and CCPA requires encrypting stored access logs and obtaining explicit for in RFID deployments. Future-proofing proximity card systems entails integrating cloud-based access management platforms, which facilitate credential revocation across distributed sites without on-premises dependencies, offering for environments. A cost-benefit of full migration to modern credentials, such as those using OSDP and mobile , typically reveals long-term savings through reduced maintenance and improved incident response efficiency, with initial investments offset by enhanced compliance and security posture.

References

  1. [1]
    Prox Cards vs. RFID Cards: A guide to these card types and their uses
    May 31, 2022 · A Proximity Card is a type of contactless smart card that can be read without being inserted into a card reader. They have become very popular ...
  2. [2]
    Radio Frequency Identification (RFID): What is it? | Homeland Security
    Aug 1, 2024 · Proximity RFID-enabled documents must be scanned in close proximity to an authorized reader and can only be read from a few inches away. No ...
  3. [3]
    From Keys and Cards to Mobile and Biometrics: A Brief History of ...
    Oct 23, 2023 · Proximity Cards: Developed in the late 1980s, these credentials cards gained popularity in the 1990s. Utilizing radio frequency identification ( ...
  4. [4]
  5. [5]
    HID® iCLASS® 202x iCLASS + Prox™ Card - HID Global
    iCLASS Prox Proximity Smart Card combines iCLASS smart card technology and HID 125 kHz Proximity technology in a single ISO standard thickness smart card.
  6. [6]
    [PDF] MIT Proximity Card Vulnerabilities
    Can proximity cards be read remotely? Yes. How far away? Several feet. Can we copy a proximity card? Yes. System uses passive authentication, not.
  7. [7]
    What to Know About Proximity Cards - The ISG
    Oct 10, 2023 · A proximity card is a technology card read without insertion, using an antenna and RFID signal to communicate its data to a reader.
  8. [8]
  9. [9]
    How to Calculate Facility Code Using Card Bit Calculators - Kisi
    Nov 30, 2022 · The HID ordering code number for the Standard 26-bit format is H10301.H10301 has 255 possible facility codes from one to 255. There can be up to ...
  10. [10]
    [PDF] microID® 125 kHz RFID System Design Guide - Microchip Technology
    This is a 125 kHz RFID system design guide covering passive RFID basics, including system handshake, backscatter modulation, and data encoding.
  11. [11]
    Low Frequency RFID Tags | LF 125 kHZ RFID Tags - GAO RFID
    LF 125 kHz RFID tags have a 10cm read range, are not sensitive to interference, and are used for animal tracking, access control, and key fobs.
  12. [12]
    Smart cards vs. proximity cards — what's the difference? - rf IDEAS
    Aug 17, 2023 · Learn the difference in memory, security, functionality and cost for smart cards vs. proximity cards, so you can determine which works best ...
  13. [13]
    NFC, UHF, HF RFID: RFID Technology & Uses Differences - Identiv
    Oct 24, 2024 · Key Differences Between NFC, UHF, and HF · 1. Range (dependent on environment, i.e., metal vs. cardboard):. NFC: Shortest range (0–10 cm), ...Missing: card 900
  14. [14]
    HID® Proximity 1386 ISOProx® II Card
    The ISOProx II Card offers proximity card technology with photo identification capability on a single access control card. It is ISO 7810 compliant, ...Missing: factors components antenna coil capacitor IC
  15. [15]
  16. [16]
    DoorKing Proximity Card Readers | Short to Long Range Access
    Passive card technology provides an unlimited number of “card reads” with no battery to wear out. Passive cards, unless they are physically abused, will last ...<|control11|><|separator|>
  17. [17]
    The History of RFID Technology
    Jan 16, 2005 · That same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A ...
  18. [18]
    The evolution of HID - SecureIDNews
    May 4, 2009 · The original 125-kilohertz technology, commonly referred to as proximity or prox, had been used in aircraft to track parts.
  19. [19]
    ASSA ABLOY acquires HID - world leader in identification ...
    Radio frequency identification technology is core in such a development. In 1991, Hughes Identification Devices (HID) started as a subsidiary of Hughes ...Missing: origin proximity
  20. [20]
    [PDF] DEFCON 17 - Who Invented the Proximity Card
    Aug 6, 2009 · After a spring of 1969 airplane ride in which he was seated next to an IBM engineer, “Cardullo sketched out the idea for the first RFID-like ...
  21. [21]
    HID® Proximity™ | HID Global
    125 kHz credentials. Description: Low frequency, entry-level proximity cards for physical access control.Missing: passive | Show results with:passive
  22. [22]
    [PDF] Guidelines for Securing Radio Frequency Identification (RFID ...
    ... cards which can be read from a farther distance than proximity cards. Such cards have a range of up to approximately 1 meter. ISO/IEC 18000 is an RFID ...
  23. [23]
    LF 125 kHz RFID Readers | LF Passive RFID Readers - GAO RFID
    Low frequency (LF) 125 kHz RFID readers interrogate RFID tags at a close proximity, with a read range of up to 10cm.
  24. [24]
    P-500-HA PROXIMITY READER - - EMX Industries
    Operating with 125-kHz Proximity RFID technology, it provides a reliable read range up to 8 inches and requires no battery for operation. Its flexible design ...
  25. [25]
    [PDF] HID® Formatted Proximity Cards & Key Tags (26/34/37-bit) - ADI
    125 kHz proven, reliable proximity technology. • HID® non-proprietary (pass-through) card data formats up to 37 bits can be factory programmed.
  26. [26]
    HID® Proximity 1336 DuoProx® II Card
    It features a graphics quality surface optimized for Photo ID printing. The proximity card with magnetic stripe is available in standard PVC construction, or a ...
  27. [27]
    [PDF] RFID Technology Overview- Attachment D to RFID Feasibility Study
    Nov 13, 2006 · In terms of cost, passive RFID tags range from $0.25 up to $10.00, depending on functionality, packaging, and application. Serial number, read- ...
  28. [28]
    Low Frequency: what is 125-134 kHz passive RFID technology?
    Mar 1, 2022 · They contain a 125-kHz chip, the contactless card can be detected at a distance of a few centimetres and the system guarantees high-performance ...Low Frequency: The... · Access Control And... · Electronic WalletsMissing: design advantages<|control11|><|separator|>
  29. [29]
    What Are Passive RFID Tags? How They Work and Uses
    Sep 17, 2025 · Shelf Life: Passive RFID tags have a very high shelf life and can last indefinitely without expiration, whereas active RFID tags have a limited ...Missing: cards | Show results with:cards
  30. [30]
    How Do RFID-based Toll-Collection Systems Work?
    This saves battery life, by allowing the active tag to broadcast only when within range of an interrogator. Here's how such a solution would work: A car pulls ...
  31. [31]
  32. [32]
    Active vs Passive RFID: Exploring RFID Systems and Which is Right ...
    Sep 19, 2024 · Active RFID uses battery-powered tags for longer range, while passive RFID uses reader energy for shorter range, and is less expensive.
  33. [33]
    None
    ### Summary of HID Proximity Card Data Formats
  34. [34]
    Knowledge base 226: H10304 Card Format Overview
    This article shows the HID 37-bit H10304 card format breakdown so you can add the format into your access control system. DescriptionFacility CodeCard.
  35. [35]
    Proximity Cards
    When there is no phase shift, the signal is a 125 kHz sinusoid slightly modulated by a 62.5 kHz sinusoid. The modulation is greatly exaggerated in the figure.
  36. [36]
    HP Proximity Card Readers | hp's Developer Portal
    If this bit is set, the reader will continuously output the data read from the card at a rate of approximately 1 read per second, as long as a card is present.
  37. [37]
    ISO/IEC 7810:2019 - Identification cards — Physical characteristics
    This standard specifies physical characteristics of identification cards, including materials, construction, dimensions, and requirements for card interface ...
  38. [38]
    ISO/IEC 7810 Identification cards - CardLogix Corporation
    Oct 25, 2023 · ISO/IEC 7810 defines physical characteristics for ID cards, including dimensions, resistance to bending, chemicals, temperature, humidity, and ...
  39. [39]
    ISO 7816 International Standard - CardLogix Corporation
    ISO 7816 is the international standard for integrated-circuit cards (commonly known as smart cards) that use electrical contacts on the card.
  40. [40]
    ISO/IEC 10373-6:2020 - Cards and security devices for personal ...
    The ISO/IEC 10373 series defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810.
  41. [41]
    HID® Proximity™ 1326 ProxCard® II™ Clamshell Card - HID Global
    Supports formats up to 85 bits, with over 137 billion codes. Custom pre-printed artwork available. A PVC overlay allows for on-site photo ID using most ...Missing: encoding | Show results with:encoding
  42. [42]
  43. [43]
    [PDF] Wiegand? - Farpointe Data
    Wiegand (pronounced wee-gand) is a standardized interface protocol commonly utilized to communicate data between a credential and a reader, ...
  44. [44]
    [PDF] PSC-1 STANDARD LIGHT PROXIMITY CARD - Farpointe Data
    Clamshell card. Formats. Wiegand (26-bit and custom formats) and ABA Track II magnetic stripe (clock and data). Material. ABS. Color. Off-white. Slot Punch1.
  45. [45]
    [PDF] Clock & Data Signaling - DSX Access Systems, Inc.
    Magstripe Card Readers typically utilize the “clock/data” signaling method and is supported by many Access Control Panels.
  46. [46]
    HID multiCLASS™ Contactless Smart Card and Proximity Readers ...
    Jul 11, 2007 · Additionally, the reader supports HID Prox, Indala Proximity or AWID formats, with additional 125 kHz card technology compatibilities available ...
  47. [47]
    Open Supervised Device Protocol (OSDP)
    Using OSDP enables communication among different manufacturers' devices and solutions. The standard applies to peripheral devices such as card readers and other ...
  48. [48]
    EM4100 protocol description - Priority 1 Design
    Manchester Encoding Scheme. With Manchester Encoding a Tag will produce a level transition in the middle of the bit period. A low to high transition ...
  49. [49]
    Proximity Card Access Control & Badge Reader Systems - Avigilon
    Discover pros & cons for different types of proximity cards & badges. Learn if a proximity card reader entry and access system is right for your security.Missing: life advantages limitations
  50. [50]
  51. [51]
    Purpose Of Proximity Cards For Access Control
    Nov 22, 2024 · Proximity cards allow for flexible programming of access levels & specific permissions for different users based on the corresponding ...
  52. [52]
  53. [53]
    RemotePro CR - Wiegand-Output Proximity Card Reader
    The RemotePro CR is a post-mounted proximity card reader with 26-bit Wiegand output, audible/LED feedback, and connects to 26-bit Wiegand controllers. It is ...
  54. [54]
    Wiegand: What Is It And How Does It Work With Access Control
    May 27, 2024 · Wiegand is a technology for card readers and sensors, using wired communication. It uses magnetic fields to switch polarity, and cards transmit ...
  55. [55]
    Proximity Reader Access Control: What It Is & How It Works
    Aug 16, 2024 · When a valid proximity card or device is presented, the reader sends a wireless signal to the system, which then processes the request and sends ...
  56. [56]
    Understanding Card Access Control Systems & Their Benefits
    Nov 19, 2024 · Benefits of card access control systems · Enhanced security · Improved operational efficiency · Comprehensive audit trails · Scalability and ...
  57. [57]
    Beyond Badge Readers: The True Cost of Legacy Access Control ...
    Jun 11, 2025 · Legacy 125 kHz proximity cards remain "arguably the most used electronic access control card in North America" despite being susceptible to ...Missing: adoption | Show results with:adoption
  58. [58]
    Outdoor Proximity Card Reader w/ Illuminated Keypad from Cortex
    Cortex security access integration · Indoor/Outdoor design · LED & buzzer for feedback · Anti-passback support · Tamper resistance switch.
  59. [59]
    Anti-Passback Access Control Systems | EZ Switch Long Island
    Aug 26, 2025 · Learn how anti-passback access control systems help businesses prevent credential sharing and enhance security.
  60. [60]
    [PDF] Access Control Technologies Handbook - Homeland Security
    A properly designed and installed token-based access control system can be used to monitor physical access, logical access (e.g., computer and network), ...
  61. [61]
    Evaluation of a Proximity Card Authentication System for Health ...
    Aug 10, 2025 · Proximity cards and readers have the potential to improve efficiency and security by allowing users to access clinical workstations simply by ...
  62. [62]
    [PDF] Advancing Smart Card and NFC Technologies at the Buffalo ...
    Apr 1, 2017 · Upgrade vending system with either 125 kHz or MIFARE DESFire EV1 technology that accepts 3rd party cards. b. Software should be upgraded to ...
  63. [63]
    [PDF] microID 125 kHz RFID System Design Guide
    (reader) through inductive coupling. When in the reader field, the device ... an exact LC resonant circuit for the carrier signal. The tuning ...
  64. [64]
    GAO-05-551, Information Security: Radio Frequency Identification ...
    ... toll systems can quickly identify and collect toll payments on roadways. ... 125 KHz; Typical read range and rate: ~1.5 feet; low reading speed; Examples ...
  65. [65]
    RFID Swimming Pool Locker Card | Secure & Contactless
    Jul 3, 2025 · ... Locker Card systems involves IoT integration to create “smart pools.” Imagine RFID-enabled towels that trigger locker assignments upon ...<|separator|>
  66. [66]
    RFID Proximity Cloning Attacks - Black Hills Information Security, Inc.
    Dec 17, 2020 · The battery in these active tags has a life cycle of 2-7 years, at which time the tag would need to be replaced. MIFARE cards and tags. NXP ...Mifare Classic 1k Cloning... · Alternative Reader/writers · Mct (mifare Classic Tool)Missing: advantages | Show results with:advantages
  67. [67]
    Proximity Cards Are a Liability: The Urgent Need to Modernize ...
    Jul 22, 2025 · The continued use of legacy authentication methods, like proximity cards, creates ideal conditions for bad actors to bypass access controls.Missing: statistics | Show results with:statistics
  68. [68]
    The 125kHz Proximity Card Dilemma - ict.co
    Dec 10, 2024 · 125kHz cards are easily cloned due to lack of encryption, making them vulnerable to hacking and signal sniffing.
  69. [69]
    [PDF] How to Build a Low-Cost, Extended-Range RFID Skimmer
    Feb 2, 2006 · The skimmer is comprised of 5 basic units (see Figure 2): A reader, a power amplifier, a receive buffer, an antenna and a power supply. The RFID ...
  70. [70]
  71. [71]
    Seven Physical Security Myths Exposed: Proven Steps to ...
    Tailgating, stolen or cloned cards, and shared badges are common security threats. Challenges. Tailgating/piggybackingbypasses card checks entirely; Legacy ...
  72. [72]
    Access Control Credential Cloning: A Real-World Threat ...
    An estimated 70% of physical access control systems still use legacy 125kHz proximity cards. These cards are not just outdated; they are a wide-open door for ...
  73. [73]
    Why Proximity Cards Are Putting Your Organization at Risk of ...
    May 7, 2025 · ... lack encryption, making them highly susceptible to cloning and other attacks. These cards can be easily duplicated using inexpensive devices ...
  74. [74]
    “Internet of Smart Cards”: A pocket attacks scenario - ScienceDirect
    We describe an architecture to attack the contactless cards of a user through his NFC-equipped mobile phone.
  75. [75]
    Multi-factor Authentication (MFA) in Physical Access Control - Genea
    Oct 21, 2022 · This article explains the benefits of MFA and a range of adaptive MFA methods that help businesses restrict unauthorized users from accessing a facility.
  76. [76]
    How to Ensure the Cybersecurity of Your Access Control Systems
    May 14, 2024 · Set a baseline with 13,56MHz technology cards. Data stored on the card should be protected with encryption (AES 128 is best practice). So ...Missing: enhancements | Show results with:enhancements
  77. [77]
    Why OSDP Has Become Access Control's International ... - HID Global
    Jan 30, 2024 · The OSDP access control standard was designed to ensure secure interoperability and communication for access control systems & devices.
  78. [78]
    [PDF] Attachment Q4 Sensitive RFID Systems v8 - Homeland Security
    Aug 5, 2014 · General security best practices commonly recommended and followed by private industry and academic communities are also included. 1.1.
  79. [79]
    Upgrade Your Access Control System the Smart Way with HID
    Oct 17, 2025 · Learn how to upgrade your access control system without disruption. Explore proven migration paths for a smooth, secure transition to modern ...
  80. [80]
    RFID Technology: The Intersection of Data Privacy, Protections, and ...
    For example, under GDPR, organizations using RFID technology must inform consumers about how their data is being collected, used, and stored, providing options ...
  81. [81]
    The top 6 cloud based access control systems in 2025 - Acre Security
    This includes issuing or revoking credentials in real time, viewing access logs, setting schedules, and responding to incidents without needing to be on site.Missing: proximity | Show results with:proximity
  82. [82]
    Top 12 Access Control Trends for Modern Security in 2025
    Discover the top 12 access control trends shaping 2025, from touchless systems and AI automation to cloud integration and unified security platforms.