Tag Archives: hid card

How an HID Prox Card Works

ISOPROX

A proximity card by HID is capable of storing embedded information inside. The information stored can be extracted and transmitted to a control system for processing. If the information transmitted lines up with the data stored in the control system, the system will provide an appropriate action, such as unlocking a door for a card holder.

The HID prox card, sized the same as your credit card, is part of a system that includes the cards, a card reader or readers, computer and an access control panel. Together, these components work together to act as a security officer in an organization to approve access to secure facilities or networks. Detailed, accurate reporting occurs with this system as the electronic devices log each transaction.

HID cards work as they carry an embedded binary code unique to the card holder. The code is referenced to the card holder in the database in the access system and is a specific sequence number that can be extracted by a card reader when swiped or held near the card reader.

The card reader connected to the access control system relays the sequencing for review when the card is held near. The control panel accepts the information and reviews it in a specific order to determine access eligibility. The data string is first reviewed for length. If that is correct, the binary code formatting is reviewed to determine if it can be recognized. With positive results, the system advances to review the facility code and the site code for positive matching results. If the card number is then confirmed in the database without restrictions on current time or location, the card holder is approved for access. The controller provides authorization to unlock the mechanisms restricting the door or network from opening.

The security personnel in charge of the software application have authorization to enter the database and update card holder information. Authorized people can configure the door access hardware to open and they can approve of the HID prox card entry at specific times. Reports for all activities can be generated as needed for management review.

Want to learn more about HID access cards and systems? Check out these links from our blog:

Using an HID card as an Identification Card

Tips for Printing on Your HID Card

Components of an Access System

Best Practices with HID Cards

HID Prox Cards – Best Practices

DUPROX
HID prox cards are used to provide security for physical and virtual assets of an organization. With the correct use of access control systems, the companies confidential areas can be tightly controlled from unauthorized users.

When implementing an access control system, it is important that the processes set in place facilitate the desired security levels. One of the places in the security process that is vulnerable is the HID prox card. Without proper handling and clear procedures, the card will not provide the security measures needed. For success with these cards, the following recommendations are provided for your review.

1. Make sure that old prox cards are voided immediately. If not voided, an unauthorized person could locate and use the card.

2. Authorize cards upon inital issuance. If cards are pre-validated and spare, the card can be used inappropriately.

3. Investigate situations where access is denied with a non standard denial response. “Card out of range”, “unrecognized,” and other responses indicating incorrect facility codes and formats indicate an illegally obtained card may have been used to attempt access.

4. Use security mechanisms on the card, such as a hologram, to discourage tampering with the card and increasing security levels.

5. Use RFID shield devices when appropriate.

6. Advise card holders to display their badge only when on company property.

Tips for Printing on Your HID Prox Card

PROXCARD
When printing from an ID card printer directly to your HID prox card (1386 cards), it is important to load your cards into the ID card printer hopper in the correct way. When the card prints and ejects the card from the printer, it is important that the image of the card is printed on the correct side with the correct edge at the top.

If you are going to be slot punching the HID prox card to wear the badge with a badge holder, punching the card correctly is critical. There are four small, usually blue, colored dots on the upper back side of the HID cards. The dots indicate where a slot punch can be safely placed.

If the HID card is slot punched at a different location than where the dots are located, the internal functioning of the card can be damaged. The internal electronic mechanics of the card run throughout the inside of the card. If part of the functioning pieces are damaged by the slot punch, the HID prox card will be non-functional.

Learn how to use an HID prox card as an identification card without directly printing on the card.

How HID Prox Cards Work

Proximity Badges

An HID prox card allows a card with information embedded inside to activate and open a door so that the cardholder can enter a secure area. The proximity card does not have the capability of accessing an area within itself. The card with additional components, provides a complete system that provides security for a controlled area.

The card is normally combined with three other items to complete an access system. In addition to the cards, a system consists of a card reader, an access control panel and a computer. In combination with each other, the system is able to function as a security officer allowing authorized persons into a building at authorized times of the day or night.

The card does not have any additional item in it over an embedded binary code (ones and zeros) that are used in a specific sequence to identify the card holder. The format of the coding is able to be picked up by the card reader and transferred to the control panel for deciphering. The card usually does not have additional information stored in it outside of the formatted code. Occasionally, the card may contain an additional code that some readers will strip off and possibly use. The format however, transfers to the access control panel.

When the controller receives the data from the card reader, the controller begins the process of the information. Various steps are completed to determine whether the cardholder has access to the building. Some of the criteria a controller uses are to review the length of the data string and the format of the information. It may be possible that a card held up to a reader is in a different format that the controller can not process.

The controller then checks the facility code and site code for a match. If so, the card number is reviewed for a match in the database. If there, the card may be reviewed to see if it is authorized for that specific time frame and date. If so, the lock relay will be activated to allow the door to open.

If the card is not able to activate the door opener, some systems will provide a specific response from the controller. Other systems may not provide any response at all.

The computer which hosts the controller will provide a software application allowing authorized personnel to update cardholder information, configure the hardware that allows door access and provides reporting functions regarding the system use.

For more information about HID prox cards, proximity cards or smart card badge holders, contact our id card experts toll free at 888-485-4696.