Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
library id image 1 e1643136438698

Is library ID keeping up with times?

Card security questionable as checkout extends to laptops, tablets

Andrew Hudson   ||   Jun 03, 2015  ||   ,

Keyboard-emulating readers enable mag and contactless

The use of a keyboard-emulating readers enable libraries to use magnetic stripe or contactless technology to push a patron ID number into an existing library check out system.

In essence, these readers connect to the computer and mimic keystrokes. It enables data to be entered to a form or application field as if it were being physically typed at the keyboard. In a library checkout system, the application waits for a fixed-length patron ID number to be presented. Using keyboard-emulating readers, this data can be typed in or provided by a bar code reader, a mag stripe reader or a contactless card reader.

For two decades, libraries have used mag stripe readers to eliminate bar codes. While it works fine, it provides little to no increase in security. This is because a mag stripe is arguably no more difficult to counterfeit than a bar code.

Contactless is another story, as it greatly ups the security ante. “Contactless keyboard-emulating readers enhance security and card utility without impacting the backend system,” explains Pawlak.

While contactless is an ideal candidate in library ID, few universities have opted to go this route.

The road ahead

While the immediate future likely won’t bring a tidal wave of change, there are certainly ways in which library patron ID can evolve.

“During recent campus library visits, the use of automated checkout and return systems seems to be growing in popularity,” says Pawlak. “Return stations allow patrons to present the card and then scan or tap the book and place it in the automated return.”

As these self-service solutions proliferate, the need for higher security from the patron ID grows. Contactless brings two benefits to solutions where staff is not involved.

First, it is easy for the student or patron to present the card as the reader does not require a specific orientation or swipe. It can simply be held within range. More importantly, however, contactless is vastly more difficult to counterfeit.

In traditional check out environments, library staff takes possession of and physically scans the ID card. This process entails at least a rudimentary visual inspection, and the photo must match the presenter. Even if staff is not vigorously validating the ID, this chance that it may occur is enough to ward off many would-be fraudsters.

When the human factor is removed and self check out is used, only the identification technology and number need to be valid. A blank white card with a counterfeit bar code or mag strip could be passable.

Perhaps this trend coupled with the need to protect the high value laptops and tablets that are offered by modern libraries, will drive the bar code off the card in favor of a more secure option.

Pages: 1 2

Subscribe to our weekly newsletter

RECENT ARTICLES

Tatiana Tomley, Secanda video interview
May 21, 26 / , ,

Inside SECANDA’s approach to modern campus identity and mobile access

In this episode of CampusIDNews Chats, Tatiana Tomley, Marketing and Business Development Manager for SECANDA, discusses the company’s expansion into North America and explains how its flexible campus identity platform supports both traditional cards and mobile credentials. Building a flexible approach to campus identity Tomley explains that while SECANDA may be newer to the US […]
Warning message from hackers to Canvas users
May 19, 26 / ,

Student ID numbers exposed in Canvas cyberattack

Canvas, a learning management system used by schools and universities worldwide, fell victim to a major cyberattack that disrupted access for millions of students during finals week. Students and educators across North America suddenly found themselves unable to access assignments, exams, grades, and course communication at one of the busiest times of the semester. The […]
illustration of hand holding phone

Your Campus Went Mobile. Now What?

The first wave of mobile credential adoption is behind many institutions. Mobile IDs are live, students are tapping their phones at residence hall doors, and card offices are fielding fewer walk-ins during orientation. But for many campuses, that progress has stalled at the door. The broader campus ecosystem – dining, recreation, printing, events, administrative systems […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.