Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Prox Biometrics No Longer Oil and Water

May 1, 2005
Until recently, proximity cards and biometrics were as incompatible as oil and water. As a result, organizations that wanted to use fingerprints or other biometric identifiers to fortify security at points of entry protected by prox card systems were forced to go to the considerable expense of replacing their legacy access control infrastructure.

Today, there are a variety of off-the-shelf hardware solutions that make it possible to marry biometric authentication with existing prox card installations at very low cost. With these products, security managers can respond to post-Sept. 11 security concerns without having to put their prox cards out to pasture in favor of costly new technology.

For fixed checkpoints such as doorways, there are now a few commercial biometric capture devices that can be placed next to wall-mounted prox card readers or purchased as one-piece fingerprint/prox card reader units. The two systems can be used in tandem to match the fingerprint of a person seeking entry to the cardholder’s identity.

For added flexibility, there is a new breed of inexpensive handheld identification terminals that can read the cardholder’s live fingerprint, compare it against a template stored either in the terminal’s on-board memory or in a backend database, and deliver a “match” or “no match” verdict to the unit’s display screen.

These handheld terminals can either complement or incorporate prox card readers, and they can be used for stationary identity checks at company doorways as well as on a roaming basis to spot-check individuals walking through a facility. In addition, they can support signature, facial or other biometric identifiers as well as fingerprint templates and other forms of identification such as photo IDs, while offering the advantage of stand-alone operation in the event a network or server connection goes down.

Both kinds of devices overcome the limited utility of serial number identification used by prox cards, essentially giving organizations a way to teach old cards new tricks.

Linking systems

Proximity cards have been the workhorse of physical access control for decades, and they have done the job well for reasons ranging from their consistent read range to a no-battery, no-swipe design that translates into long life. Like today’s newer contactless smart cards, they operate via radio frequency, so there is no physical contact-related wear and tear on either the card or the reader.

The drawback is that prox cards utilize older technology that cannot directly support modern security measures. Each card carries a microchip that emits a serial number when held near a card reader, and that chip is unable to accommodate anything more than the serial number for which it was designed.

The embedded serial number, however, is the key to grafting biometric technology onto proximity card systems. The serial number from a given prox card can double as the biometric record locator, serving as the critical link between the two systems.

To associate cardholders’ prox card numbers with their biometric templates, security managers can either append their existing prox card number database with a new biometric field, or build a separate biometric repository to be used in conjunction with the prox card code database. The choice will depend on the specific hardware solution and the architecture of an organization’s overall security strategy.

Stationary biometric readers may be sufficient for some situations, but do not offer advanced capabilities such as internal memory for storing a local database, the option to operate either in stand-alone mode or connect to a back-end database, or built-in 802.11 or Bluetooth support to enable wireless data and fingerprint transmission for identity search and verification against a back-end system.

The stationary devices currently on the market for use with prox card systems are also limited to fingerprint identification.

Sidebar: Sample application

One organization that has elected to beef up its legacy proximity card system with add-on fingerprint screening is a U.S. nuclear power plant with 5,000 users.

At this plant, security officials capture two fingerprint templates per cardholder, adding that information to an existing database of HID (Irvine, Calif.) proximity card numbers, and using Datastrip (Exton, Pa.) DSVII-SC mobile identification terminals to perform identity checks. Prox card readers were integrated into the units along with a custom Windows CE.NET application that drives the identity validation process. All operations are carried out quickly on one piece of hardware.

As each user waves his or her prox card near the terminal, the device checks to see whether that card number is in the database maintained in the terminal’s on-board memory. If it is not, the display screen on the front of the unit indicates that the user is unknown. When that happens, a screen message prompts the cardholder to place his or her registered fingers onto the device’s built-in fingerprint sensor. The terminal then compares the live fingerprints to stored templates, determines if they match, and displays the results on the screen.

Meanwhile, the portable nature of the terminal offers important benefits during planned spring and fall outages, when roaming crews take turbines offline for maintenance. The 2-lb., battery-operated units are light enough to be carried by security guards and therefore deployed wherever crews are working at different hours and different times of year.

Sidebar: Another Hand Approach

Covenant Aviation Security, a private company that was awarded a Transportation Security Administration contract to protect San Francisco Airport, the nation’s fifth busiest, from terrorism, is using biometric HandReaders to verify employee identities before granting them access to their work areas.

The technology comes from Campbell, Calif.-based IR Recognition Systems, the biometric component of Ingersoll-Rand’s (IR) Security & Safety Group’s Electronic Access Control Division. HandReaders automatically take a three-dimensional reading of the size and shape of a hand and verify the user’s identity in less than one second.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Iris Now No Longer at Rest

    See More
  • EPA: So-called Business “Secrecy” No Longer Reason to Withhold Chemical Safety Info

    See More
  • U.S. No Longer Mandating 100 Percent Screening of Cargo Containers

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing