Having to enter a system code every time you want to arm or disarm can be inconvenient. As you probably know, there are ways to do this without having to enter a valid code. The most common methods are to use a key fob or to use an interactive monitoring platform like Total Connect 2.0 or Alarm.com to access your system remotely. But some panels and keypads will support the use of proximity tags. These will let you arm and disarm right from the panel without having to enter a valid code.
A proximity tag is a very small handheld device that can be held up to a proximity tag reader built into a panel or keypad. The reader will scan the proximity tag and recognize it in place of a regular system code. Proximity tags vary in size, but they are typically very small. In fact, some are even as small as a guitar pick. Others are somewhat larger, being about the size of a business card. Regardless, they are very easy for one to keep on their person. A user will typically keep their proximity tags inside a pocket or their purse. Some proximity tags can even be worn as lanyards for easy access.
Each proximity tag is associated with an actual user code that is assigned with the system. When the proximity tag is used, the system will see it as that code being entered. If you check the Event Log for the system, then it will show that the associated code was entered. To the system, using the proximity tag is essentially the same as entering that code. If there are multiple people who regularly control the system, then you can give everyone a different proximity tag with their own unique codes. This way, the system will know whoever operated the system.
In order to setup proximity tags on your system, you will need a proximity tag reader. These readers are typically built into certain keypads and wireless all-in-one panels. With the rise of interactive monitoring platforms, proximity tags are not as commonly used today. But they are still commonly used in certain businesses and by people who may have trouble remembering a system code. You might definitely want to consider setting them up if you find our that your system has a keypad with a built-in proximity tag reader available.
Proximity tags are also great for use on systems that support partitioning. Remember that a partitioned system can have different user codes assigned to different partitions. This is done to restrict access to users and ensure that only authorized personnel are able to control certain portions of the security system. Since proximity tags are essentially no different than user codes, you can assign different proximity tags to different partitions. This is perfect for ensuring that only authorized users are able to access certain parts of the system.