Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Beyond Prox, RFID Goes Viral

By Bill Zalud
November 29, 2010

Aprox card is a card is a card unless you do more things with it. And that’s what is happening as radio frequency identification (RFID) in its many increasingly powerful forms becomes a diverse security and business tool to apply to people, vehicles, assets and even processes. Active or passive, more or less intelligent, contact or contactless, with ranges from inches to feet, RFID is suddenly the super solution.

Most enterprise security leaders know RFID as the proximity card, contactless integrated circuit (IC) devices for security access or payment systems. Proximitycards are powered by resonant energy transfer. They are, at their basic, an automatic data collection solution. RFID systems consist of an RF tag – or a transponder: a radio receiver or transmitter that responds to an external signal by automatically transmitting a signal – and an RF reader/controller.

SEC1210-rfid-inbody_fig1

RFID tags are a growingly essential tool in healthcare facilities to security expensive assets and track inventory.

But it is the smarter RFID solutions to identify people, cars, assets and procedures that bring the technology to life for enterprises, their security executives and others.

Cards come in passive and active versions as well as PSK (Phase Shift Keying) and ASK (Amplitude Shift Keying) formats, MIFARE and HID-compatible cards. Each has its own technical and application advantages. Readers, of course, must match the card technology. Readers can also include PIN, keypad or biometrics, in addition. But don’t forget the security. For instance, readers, cards and tags using a digital encryption algorithm deliver a needed level of communications security between the cards and readers.

 

Diverse Types of RFID Tech

MIFARE is reputedly the most widely installed contact less smartcard, or proximity card, technology in the world with more than 1 billion smart card chips and 10 million reader modules installed. The technology is owned by NXP Semiconductors. MIFARE contactless technology, more popular outside the U.S., is used in many different applications including public transportation, access management, event ticketing and customer loyalty. With sources such as RF Logics carrying the cards and readers, MIFARE use will increase.

Another indication: LEGIC Identsystems says it will support MIFARE technology in its reader platforms.

Still, technology is nothing without its applications and there are plenty when it comes to RFID. Proximity cards and to a lesser degree contactless smartcards are typical when it comes to door access control. But, when it comes to vehicle and parking security applications, longer read range passive RFID comes into play. For example, Schorr has a two-side printable passive long range card that does not require a battery and has a read distance of 15 feet.

Some RFID tags do have batteries, and that can reduce the life of the investment. There are some active tags with replaceable batteries, as well.

Still, just as use of security video has gone beyond security, RFID has itself become a tool with myriad people and asset applications.

For example, in healthcare facilities, RFID systems can provide real-time patient safety and security monitoring solutions. Some systems aim at protection of ambulatory individuals suffering from Alzheimer’s disease and dementia or other high risk residents and patients who exhibit the tendency to wander off unnoticed. The approach permits regular movement of care givers, guests, other residents or family members through a protected doorway while preventing unsupervised “wanderers” from leaving protected areas. Should a high risk resident or patient approach the door through which they are not allowed to pass unescorted, an automatic alert functionality immediately triggers.

A model program at the University of Chicago Medical Center gives caregivers RFID-enabled badges to wear and which monitor hand hygiene events upon entering and exiting a patient room. The system also includes communication screens in each patient room that can display hospital- or patient-specific information. The initiative aims to improve hand hygiene quality and compliance monitoring. The technology is a “smart” touchless system that monitors compliance without any disruption to workflow. The Centers for Disease Control, the Joint Commission, World Health Organization and other healthcare-related organizations are placing increasing emphasis on the importance of effective hand-hygiene compliance to help reduce the spread of infection.

KEYWORDS: patient proximity security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Adding Value with RFID, Prox, Contactless Innovations

    See More
  • Video Surveillance Goes Beyond the Show Floor

    See More
  • RFID: The 'Almost Everything' Tool

    RFID: The 'Almost Everything' Tool

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products

Events

View AllSubmit An Event
  • May 7, 2026

    Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

    In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing