Technologies of Proximity Card Reader

Passive Proximity Readers

 

Nearly all building access cards based on proximity are passive. There are roughly 125 million cards used for accessing secured buildings today.

 

Passive technology implies there is no battery or power source required in the card. The proximity reader constantly transmits a low level fixed RF signal that transmits energy to the card. When the card is held at a certain distance from the reader, the RF signal is absorbed by a small coil inside the card and powers the card’s chip which contains a unique identification code. Once powered, the card transmits the code to the reader.

 

The advantages of proximity over other technologies are numerous: no moving parts, no mechanical wear, no slots, no read heads to maintain. The reader can be concealed inside walls or special enclosures and, even when the reader is surface mounted, it has no openings to jam or tamper. The card is the most secure and practically impossible to duplicate. Cards can usually be read through a purse or wallet and through most other nonmetallic materials. Card and reader orientation is not critical.

 

Reading ranges depend primarily on the reader. The larger the reading range, the larger the reader’s concealed antenna and hence, the size of the reader. There is a great variety of proximity readers designed for different environments including vandal-resistant mullion mount, smaller decor style and integrated keypad/reader units.

 

Active Proximity Readers

 

Active proximity technology implies there is a battery within the card. Since the card has power the range is greatly expanded (3-15 feet vs. 1-5 inches). The RF signal is low level (<1mw) but the frequency used is much higher. Applications tend to be uniquely applied, although recently the application in computer access control is more prevalent.

 

Orientation of the card and reader become important. Since the RF frequency is much higher several other effects may be noticed such as exact distance due to the fact that the signal bounces off of other object.

 

Active technology is useful where a hands-free (as opposed to contactless) data exchange is required. Since the range is much longer, it is generally not very practical for door access (except gated parking lots) since walking past the door may unlock the room. The typical application is to detect the presence of a person at a computer and allow access without intervention. Equally important is to automatically lock the computer when a person steps away.

 

Read range is adjustable between 3 to 15 feet.

 

Active cards are generally thicker (1/5 inch) as a result of the replaceable battery requirement

 

Presence Detectors

 

Sonar technology is a relatively new entrant as a tool for security with PCs.

 

In computer security there are two primary components to consider:

 

  1. Unlocking the ‘locked’ workstation, and
  2. Locking the workstation after the logon user leaves the station.

 

The first component generally gets the most attention and array of solutions while the second is generally handled by a time-out screen saver or company mandated policy. Both solutions for ‘2’ above are fraught with exposure issues.

 

The use of sonar technology is a means for detecting the presence or absence of an individual, and performing a specific operation when there is a change. It is important to understand there is no real identification of the user performed with this technology.

 

When a user steps away from an authorized session, the sonar device can detect this occurrence and send the appropriate keystrokes to secure the workstation (log off or lock). This improves solutions associated with policy since the device never forgets to lock. It is also a great improvement over a time-out in that this occurs immediately as opposed to a parameter set by the minute(s).

 

Likewise when the user steps up to a locked workstation, the appropriate keystrokes can be set to call up the logon dialog.

 

This technology can be a great aid for other forms of authentication such as biometrics.

 

Pongee Industries Co., Ltd. is the company of specializing in proximity reader, writer, and programmer. They also provide kinds of high quality access controllers for customers to select. Need more information, welcome to visit the Pongee’s website and feel free to contact with them.

 

 

Article Source: https://www.rfideas.com/support/learning-center/proximity-reader-technologies

What Is a Proximity Reader?

If you are in the process of updating your home’s or business’s security system or if you never had such a system and you are planning to invest in one, there are probably a lot of industry terms you don’t understand very well. That is why, in this article, we are going to talk about two important parts of any security access system, the proximity card and the proximity reader.

 

Proximity cards, also referred to as prox cards, are different than the magnetic stripe cards, because they do not need to be inserted into the reader device to grant access in the secured area. We say “grant access” because the majority of proximity cards and proximity readers are used as a part of home or business security system. Other uses include library cards, contactless payment systems or in public transit fare. Proximity cards are practical due to the fact that they can easily be read through a wallet or a purse.

 

There are two main types of proximity cards: passive and active. Passive prox cards have a limited range and are widely used to grant access in office buildings. Active cards, also called vicinity cards, have a greater range (150 meters), due to the fact that they use and internal lithium battery. They can be used to easily access courtyards from inside of a vehicle or from automated toll collection.

 

Now, in case you were wondering “What is a Proximity Reader?” they are devices that can store details about the identity of the cards holders, granting them access to otherwise restricted areas. This system is similar to the “chip and PIN” bank cards, with the difference that the proximity reader grants access using radio frequencies and does not need actual insertion of the card. Also, they offer more security to their holders, due to the fact that they are harder to copy. Another great advantage of these readers is the fact that they are quite sturdy and do not need any maintenance.

 

Another term you might encounter when browsing for this type of access system in “Contactless Smart Card”, which is basically the same thing, with the difference that they use advanced methods of data encryption and authentication, meaning that they offer a higher level of security. Besides this general information, there are various technologies that are used in the manufacture of proximity cards and readers.

 

If you are planning to invest in such a system, you must know that the prices are very different from one product to another. For example, the price for a single card ranges from $2 to $200, while for the proximity reader you can pay from $100 to $400.

 

Before making any purchase, we advise you to ask the advice of an experienced security technician, just to make sure that you choose the right system for your needs. The good news is that the majority of shops, even online ones, have an assistant which can help you make the right decision.

 

Pongee Industries Co., Ltd. is the manufacturer of proximity reader. If you are looking for the best proximity reader, don’t miss Pongee’s website, we can offer clients kinds of high quality products. Contact with Pongee to obtain further product information!

 

 

Article Source: http://EzineArticles.com/8665232