Tag Archives: HID

HID Prox Card

HID Prox Card IIHID Prox Card

The HID prox card contains an integrated circuit that a reader on the same frequency scans. As part of an access control system, the card is a critical component in managing secure facilities or networks. When presented to the reader, the card transmits encoded information. A specialized controller or software application interprets this information, then compares it to a set of rules and permissions. These rules allow the software to determine whether or not the card holder should have access to the requested resource.

Types of Prox Devices

The ISO HID prox card combines the printable properties of standard PVC cards with the access control features listed above. While these cards are more expensive than standard PVC cards, most users consider their dual purpose to be a good value.

The clam-shell HID prox card is not a printable prox card. To serve as a visual ID, it requires the application of a printable pressure sensitive card.

Tags and keyfobs cannot serve as visual IDs but use the same technology as other prox devices for access control purposes. These are especially popular in housing developments for access to common areas such as pools, gyms, and laundry facilities.

How to Acquire Prox Devices

Safe-Card ID Services offers HID prox cards that are pre-encoded to match a user’s system specifications. To make issuance easier, many users print on these pre-encoded ISO cards or apply an overlay to clam-shell cards.

A wide range of printers feature optional encoding modules. These modules enable the on-demand encoding of ISO HID prox cards to match the specification of an access control system. Current Fargo printers that can encode HID prox cards are the Fargo HDP5000, Fargo HDP5600, Fargo DTC1250e, Fargo DTC4250e, and Fargo DTC4500e. For information about cards that can be used with identification applications, visit our HID prox-card page.

Tips for Printing on Your HID Prox Card

PROXCARD
When printing from an ID card printer directly to your HID prox card (1386 cards), it is important to load your cards into the ID card printer hopper in the correct way. When the card prints and ejects the card from the printer, it is important that the image of the card is printed on the correct side with the correct edge at the top.

If you are going to be slot punching the HID prox card to wear the badge with a badge holder, punching the card correctly is critical. There are four small, usually blue, colored dots on the upper back side of the HID cards. The dots indicate where a slot punch can be safely placed.

If the HID card is slot punched at a different location than where the dots are located, the internal functioning of the card can be damaged. The internal electronic mechanics of the card run throughout the inside of the card. If part of the functioning pieces are damaged by the slot punch, the HID prox card will be non-functional.

Learn how to use an HID prox card as an identification card without directly printing on the card.

How HID Prox Cards Work

Proximity Badges

An HID prox card allows a card with information embedded inside to activate and open a door so that the cardholder can enter a secure area. The proximity card does not have the capability of accessing an area within itself. The card with additional components, provides a complete system that provides security for a controlled area.

The card is normally combined with three other items to complete an access system. In addition to the cards, a system consists of a card reader, an access control panel and a computer. In combination with each other, the system is able to function as a security officer allowing authorized persons into a building at authorized times of the day or night.

The card does not have any additional item in it over an embedded binary code (ones and zeros) that are used in a specific sequence to identify the card holder. The format of the coding is able to be picked up by the card reader and transferred to the control panel for deciphering. The card usually does not have additional information stored in it outside of the formatted code. Occasionally, the card may contain an additional code that some readers will strip off and possibly use. The format however, transfers to the access control panel.

When the controller receives the data from the card reader, the controller begins the process of the information. Various steps are completed to determine whether the cardholder has access to the building. Some of the criteria a controller uses are to review the length of the data string and the format of the information. It may be possible that a card held up to a reader is in a different format that the controller can not process.

The controller then checks the facility code and site code for a match. If so, the card number is reviewed for a match in the database. If there, the card may be reviewed to see if it is authorized for that specific time frame and date. If so, the lock relay will be activated to allow the door to open.

If the card is not able to activate the door opener, some systems will provide a specific response from the controller. Other systems may not provide any response at all.

The computer which hosts the controller will provide a software application allowing authorized personnel to update cardholder information, configure the hardware that allows door access and provides reporting functions regarding the system use.

For more information about HID prox cards, proximity cards or smart card badge holders, contact our id card experts toll free at 888-485-4696.