704.987.2238​
[email protected]​
ABOUT US
Bill Pay
  • Products & Solutions
    • CloudSuite Portfolio
    • Badge Printer & Supplies >
      • ID Card Printers >
        • Fargo Printers
        • Evolis Printers
        • Zebra Printers
        • Magicard Printers
        • Swiftcolor Printer
        • Nisca Printers
        • Entrust Printers
        • Matica Printers
      • ID Printer Ribbons
    • Mobile ID >
      • ColorID Mobile Solution
    • Access Cards & Credentials >
      • Blank ID Cards
      • Proximity Cards
      • Contactless Smart Cards
      • UHF Cards & Tags
    • Software >
      • CardExchange® Cloud Suite
      • HID Fargo Connect Solution
      • RemotePhoto by CloudCard ID Photo Upload Software
      • CardExchange® Desktop ID Software
      • Asure ID Software
      • ID Works Software
      • Adaptive Issuance Instant ID
    • Visitor Management >
      • HID Visitor Manager
      • Identigy JRNY.Visitor
      • Easy Lobby SVM
      • Verkada VMS
    • ID Readers >
      • Contactless ID Card Readers >
        • HID® Signo™ Readers
        • iCLASS SE® Readers
        • multiCLASS SE® Readers
        • Biometric Readers
        • Proximity Readers
      • Desktop Readers
      • Electronic Signature Pads
      • Magstripe & Barcode Readers
    • Biometric Recognition Devices >
      • Facial Recognition
      • Iris Recognition
      • Fingerprint Recognition
      • Biometric Dining
    • ID Accessories >
      • Badge Holders
      • Badge Reels
      • ID Card Lanyards >
        • Design-A-Lanyard Tool
      • ID Card Strap Clips
    • ID Cameras
    • Tripods & Backdrops
    • Sports & Entertainment Venues
  • Services
    • Identity Roadmap
    • Modern Identity Management
    • Recarding Services
    • Card Migration
    • Government Contracts
    • Pre-Printed Carding
    • Partner Portal
  • Support
    • Learning Center >
      • e-binder
      • Spotlight Articles
      • Knowledge Library
    • Tech Services >
      • Remote Support
      • Warranty Info
      • File Upload
      • CHOICE Support Program
    • Drivers and Firmware
  • QuickQuote
  • Contact Us
Prox card, proxie card, keycard, hid card, smart card, access badge, corporate 1000 card, 26 bit card – whatever you call it, the 125 kHz radio frequency card is still the most widely used card for electronic access in North America. Unfortunately, few people are aware of recent developments that threaten the security status of these familiar cards.
 
The word “prox” is an abbreviation of “proximity,” which just means “near.” Proximity cards are a significant upgrade for users of mag stripe or Wiegand access cards, which have to be swiped through a reader. Prox cards only need to be held near a reader to open a door, and they work through a wallet, purse, pants pocket or whatever else they are in at the time. Cardholders have enjoyed the convenience of prox cards for nearly three decades. 
Picture
Cloning Prox is easy as 1-2-3

Why 125 kHz Proximity Is Broken, Unsecured Technology

​Prox card, proxy card, keycard, HID card, smart card, access badge, corporate 1000 card, 26 bit card – whatever you call it, the 125 kHz radio frequency card is still the most widely used card for electronic access in North America. Unfortunately, few people are aware of recent developments that threaten the security status of these familiar cards.
 
The word “prox” is an abbreviation of “proximity,” which just means “near.” Proximity cards are a significant upgrade for users of mag stripe or Wiegand access cards, which have to be swiped through a reader. Prox cards only need to be held near a reader to open a door, and they work through a wallet, purse, pants pocket or whatever else they are in at the time. Cardholders have enjoyed the convenience of prox cards for nearly three decades. 
by: David Stallsmith
​Director of Strategic Initiatives
Picture
Cloning a Prox Card is easy as 1-2-3
​Since their operation was so mysterious, prox cards were generally thought to be as secure as they were convenient. For a long time, this was mostly true because the technology needed to clone a card was big and expensive. However, as with all things technical, the price for cracking a prox system has come down tremendously. Today, anyone can buy a device at a large online retailer for under $20 which can read the data from most 125KHz prox cards, store it, then write it to an unprogrammed card with just the press of a button. There are also more powerful devices for under $500 that fit in a backpack and can read the data from a prox card several feet away, even if it is inside a wallet or purse. Both types of devices can be used to create unauthorized cards that the access control system cannot distinguish from officially issued prox cards. 
 
These readily available and inexpensive devices for cloning, or copying, prox cards introduce a new level of threat to the security landscape. When a malefactor wants to breach a system to steal, destroy or injure a person or asset, or to cause embarrassment to an institution, they look at the means available to accomplish that end. Not too long ago, it was easier to pick a lock, break a window or socially engineer a password attack than it was to tamper with a prox-based electronic access control system. However, with online retail outlets now offering effective tools for opening locked doors or allowing access to other electronic systems such as health records, what used to be a remote threat has now moved into the foreground of possibility.
Legacy prox cards and readers were designed to communicate small amounts of data, usually 8-16 digit card numbers, in the 125 kHz radio frequency range. Convenience and function were far more important design considerations than security, so data was transmitted in unencrypted form. Later attempts by manufacturers to bolster the security of simple prox technology ranged from proprietary card number formats and ranges based on end user licensing (e.g. Corporate 1000), to simple data scrambling techniques that were used as a perennial freshman code-breaking exercise at one well-known engineering school. These techniques were effective as long as the few prox card and reader manufacturers controlled access to the technology. Unfortunately, prox reading and writing technology is now so widely understood and available that the primary access card and reader manufacturers have lost their gatekeeper status and the doors of their customers’ buildings and systems are virtually standing wide open.
 
While most institutions have layers of security such as video monitoring, human patrols and employee awareness programs that mitigate risks to prox-based access control systems, the vulnerability of a virtually unlocked access point is addressable in a direct manner. Prox-based electronic access systems for doors and networks have relatively inexpensive end points, namely cards and readers. In most cases, legacy prox cards and readers can be replaced with new advanced technology cards and readers which communicate using modern encryption techniques that are essentially unbreakable. The new readers are typically interchangeable with legacy readers, so they can be used with existing access control systems.
 
Many corporations and institutions have migrated from legacy prox systems to more secure cards and readers. Some of these migrations were made voluntarily and in advance of any problems, but many were made after a breach revealed the unsuspected vulnerability. Card and reader security is often overlooked for technology refresh scheduling, but the recent dramatic increase in the vulnerability of prox-based systems should move this item up in an organization’s security priorities. ​
Set up a time to work with ColorID on migrating your  proximity
​card technology.

Submit
Check out this contactless card technology evolution infographic.

Your browser does not support viewing this document. Click here to download the document.

WE'RE HERE TO HELP.

ColorID has spent decades serving the ID Industry with top-level sales and support to build the ultimate trust with every customer.
REQUEST A QUICKQUOTE ➔

Picture CONNECT WITH COLORID


20480 Chartwell Center Dr. Cornelius, NC 28031
704.987.2238
[email protected]
Mon-Fri: 9am - 5pm (EST)

Picture CUSTOMER SUPPORT

➔ HOW TO PLACE AN ORDER
➔ BILL PAY
➔ CONTACT US

➔ SHIPPING & RETURNS
➔ CREDIT CARD POLICY
➔ FAQ

Picture ColorID e-Binder

ColorID's interactive e-Binder showcases the full line of products and services needed for your organization's ID needs.
VIEW e-BINDER➪
Picture

SITE MAP ・ TERMS & CONDITIONS ・ RETURN POLICY

 © ColorID, LLC - 2023  |  All Rights Reserved