Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
library id image 1 e1643136438698

Is library ID keeping up with times?

Card security questionable as checkout extends to laptops, tablets

Andrew Hudson   ||   Jun 03, 2015  ||   ,

Keyboard-emulating readers enable mag and contactless

The use of a keyboard-emulating readers enable libraries to use magnetic stripe or contactless technology to push a patron ID number into an existing library check out system.

In essence, these readers connect to the computer and mimic keystrokes. It enables data to be entered to a form or application field as if it were being physically typed at the keyboard. In a library checkout system, the application waits for a fixed-length patron ID number to be presented. Using keyboard-emulating readers, this data can be typed in or provided by a bar code reader, a mag stripe reader or a contactless card reader.

For two decades, libraries have used mag stripe readers to eliminate bar codes. While it works fine, it provides little to no increase in security. This is because a mag stripe is arguably no more difficult to counterfeit than a bar code.

Contactless is another story, as it greatly ups the security ante. “Contactless keyboard-emulating readers enhance security and card utility without impacting the backend system,” explains Pawlak.

While contactless is an ideal candidate in library ID, few universities have opted to go this route.

The road ahead

While the immediate future likely won’t bring a tidal wave of change, there are certainly ways in which library patron ID can evolve.

“During recent campus library visits, the use of automated checkout and return systems seems to be growing in popularity,” says Pawlak. “Return stations allow patrons to present the card and then scan or tap the book and place it in the automated return.”

As these self-service solutions proliferate, the need for higher security from the patron ID grows. Contactless brings two benefits to solutions where staff is not involved.

First, it is easy for the student or patron to present the card as the reader does not require a specific orientation or swipe. It can simply be held within range. More importantly, however, contactless is vastly more difficult to counterfeit.

In traditional check out environments, library staff takes possession of and physically scans the ID card. This process entails at least a rudimentary visual inspection, and the photo must match the presenter. Even if staff is not vigorously validating the ID, this chance that it may occur is enough to ward off many would-be fraudsters.

When the human factor is removed and self check out is used, only the identification technology and number need to be valid. A blank white card with a counterfeit bar code or mag strip could be passable.

Perhaps this trend coupled with the need to protect the high value laptops and tablets that are offered by modern libraries, will drive the bar code off the card in favor of a more secure option.

Pages: 1 2

Subscribe to our weekly newsletter

RECENT ARTICLES

Identity-first infrastructure woman on phone

Is identity-first infrastructure evolving the campus card model?

For years, campus technology leaders have discussed the coming shift to cloud-based systems, flexible credential options, and non-proprietary hardware and solutions. According to Danny Smith, owner of ColorID, that transformation is no longer theoretical – it’s happening now, and it is fundamentally changing how universities think about identity infrastructure. “Even before the pandemic, when we […]
Covington KY skyline
Mar 17, 26 / ,

NACCU hotel reservation deadline just days away

The NACCU Annual Conference is fast approaching and the deadline to book your hotel rooms is March 25 at 11:00pm CST. NACCU has secured special conference rates at two hotels – the Cincinnati Marriott at RiverCenter and the Hotel Covington. According to the association, however, the Marriott has limited remaining availability. All the more reason […]
Aliro mobile phone and access control reader

Aliro in higher education: Global tech firms back new standard for interoperable mobile IDs

A new standard is here for smart locks and digital keys, but there are major questions about the impacts of Aliro in higher education. Launched in spring 2026, Aliro 1.0 was created by the Connectivity Standards Alliance (CSA) to move access control and mobile credentials away from propriety solutions to a new universal protocol. This […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.