Monthly Archives: March 2009

ID Flow Software Screen Shots

ID Flow is premier software for card design, production and data management. The software provides a method to design and print id badges on plastic or paper. Bar codes, biometrics and mag stripes can be added to the cards. With the software, connect and manage the cardholder database.

Following are screen shots from the software:

ID Card Designer

Lobby Track

Card Issue Center

Lobby Track

Cardholder Record Lookup

Lobby Track

Report Center

Lobby Track

Record Center

Lobby Track

For brochures and specific information about Lobby Track or ID Flow software, contact our id card experts at 888-485-4696.

Lobby Track Visitor Management Screen Shots

Lobby Track 4 is premier software for visitor and member management. The software registers visitors and members. The software will issue permanent and temporary badges as well as track time and attendance. The software can be used to monitor many activites throughout the organization.

Following are screen shots from the software:

Main Menu

Lobby Track

Visitor Check In

Lobby Track

Successful Visitor Check In

Lobby Track

Record Center

Lobby Track

Charts in the Record Center

Lobby Track

ID Flow Four Badge Designer

Lobby Track

For brochures and specific information about Lobby Track or ID Flow software, contact our id card experts at 888-485-4696.

iCLASS and MIFARE Authentication Process

Proximity Badges

The HID iCLASS and MIFARE cards have embedded information inside to activate a door so that the cardholder is able to access the area to complete authorized tasks. The cards are considered contactless smart cards.

The basic process of authorization is almost identical to the process in our How an HID card works blog post. The card is read by the appropriate scanner or reader. The reader transfers the internal binary code to the access controller which interprets the card information in accordance with it’s programming and the database of cardholder information. The controller reviews the length of the data string and the format of the information prior to proceeding further in the sequence. If the format and data string pass, the card is analyzed for facility and site codes. Card numbers are reviewed for access authorization.

In addition to the above processes, an iCLASS and MIFARE card will go through an additional security step. These cards will compare security keys found in both the card and the reader. This process is called mutual authentication. This process happens prior to the forwarding of information from the card reader to the access controller. If the security keys match, the reader activates the process of forwarding the information. If they keys do not match, the reader does not forward the information to the controller as the card is not able to be activated.

For more information about proximity cards or smart card badge holders, contact our id card experts toll free at 888-485-4696.

Asure ID 2009 Software Download – Trial

Asure ID 2009 is no longer offered, having been upgraded and replaced by Asure ID® 7. Want to test this latest iteration of Asure ID® card software?  Click on the logo below, which will take you directly to the product download page. Once installed, you will have access to a 30-day trial of this industry leading product, absolutely free!

Asure ID Logo

Asure ID® is an ID-card design and printing software application, that provides card issuers with a clean, easy-to-navigate interface, and a complete array of custom card printing options. There are 4 available editions, offering a range of options to satisfy nearly any type or size organization:

  • Solo Edition – Simple, entry-level card personalization software for organizations requiring production and retention for up to 200 database records;
  • Express Edition – Powerful, stand-alone card personalization software designed for single-user environments, and practically unlimited data retention;
  • Enterprise Edition – Card personalization software for multi-user organizations that can share a common database;
  • Exchange Edition – Supports more sophisticated & secure credential applications, providing advanced smart card functionality and laser engraving.

You can download a PDF file HERE for a full comparison of features offered in each edition.

Regardless of edition, Asure ID is easy to use, has in intuitive user interface, and includes the features needed to create crisp, vibrant, and secure cards. It provides a wide range of capabilities for card issuance and card management in small and large organizations alike.

Need More Info?

For purchasing information, please check out our Asure ID information page, or go directly to the Safe-Card ID web-store. To have your specific questions addressed about ID-card software or ID-card printer systems, please contact our staff of ID experts toll-free at 888.485.4696 (US & Canada), or +1 704.535.5200 elsewhere.

Asure ID® is a registered trademark of HID Global.

How HID Prox Cards Work

Proximity Badges

An HID prox card allows a card with information embedded inside to activate and open a door so that the cardholder can enter a secure area. The proximity card does not have the capability of accessing an area within itself. The card with additional components, provides a complete system that provides security for a controlled area.

The card is normally combined with three other items to complete an access system. In addition to the cards, a system consists of a card reader, an access control panel and a computer. In combination with each other, the system is able to function as a security officer allowing authorized persons into a building at authorized times of the day or night.

The card does not have any additional item in it over an embedded binary code (ones and zeros) that are used in a specific sequence to identify the card holder. The format of the coding is able to be picked up by the card reader and transferred to the control panel for deciphering. The card usually does not have additional information stored in it outside of the formatted code. Occasionally, the card may contain an additional code that some readers will strip off and possibly use. The format however, transfers to the access control panel.

When the controller receives the data from the card reader, the controller begins the process of the information. Various steps are completed to determine whether the cardholder has access to the building. Some of the criteria a controller uses are to review the length of the data string and the format of the information. It may be possible that a card held up to a reader is in a different format that the controller can not process.

The controller then checks the facility code and site code for a match. If so, the card number is reviewed for a match in the database. If there, the card may be reviewed to see if it is authorized for that specific time frame and date. If so, the lock relay will be activated to allow the door to open.

If the card is not able to activate the door opener, some systems will provide a specific response from the controller. Other systems may not provide any response at all.

The computer which hosts the controller will provide a software application allowing authorized personnel to update cardholder information, configure the hardware that allows door access and provides reporting functions regarding the system use.

For more information about HID prox cards, proximity cards or smart card badge holders, contact our id card experts toll free at 888-485-4696.