Category Archives: Access Cards

The Lowdown on Thin ID Card PVC

Have you ever noticed some PVC Cards are thinner than other.  No they don’t hit the gym more often, they are just a variation of card stock that can be used for a couple of different purposes in the ID industry. For instance, thin cards (typically 10mil) can be used to produce professional business cards that are more durable than their ordinary paper counterpart. Not only will these cards hold up better, your business cards will stand out from the pack.

Thin PVC Cards that are also adhesive-backed are commonly used with access cards, like the HID Prox II Calmshell, that are too thick for some ID card printers. The card information is printed on the thin card and then affixed to the thicker technology card. These cards can be CR79-sized, which means that they are slightly smaller than standard CR80, credit-card sized cards. The smaller size allows the cards to fit into the inside edge of a technology or proximity card with ease.

It is very important to know that not all ID card printers can accommodate thin cards, so make sure you check the printing guidelines for your specific printer model or speak with an expert at Safe-Card ID Servces before purchasing thin PVC for your ID Card program.

Practice Safe Handling With HID and Access Cards

HID Access Cards

HID and access cards are typically shipped to you shrink wrapped and since they can cost significantly more than traditional PVC it is important to follow these tips;

Take care not to scratch the cards when opening the wrapping, especially when using a sharp implement.

Handle cards by the edges, not by the flat finished surface.

Use lint free gloves or finger cots to prevent hand oils from transferring to the
cards, which can cause smudging, fingerprints or other distortions
when printing.

Card image quality may vary even with careful card handling. This can be due to printer setup variations, lot to lot material variations, environmental changes, printer types, background color selections and other variables.
HID and access cards have been quality tested to meet requirements for high quality images. Failure to achieve a desired image quality is typically not the fault of the card.

For more information contact an expert at Safe-Card ID Services today.

 

Proper Access/HID Card Slotting

Access or proximity cards will have slot punch indicators, small dots visible on the card back
which show the only allowable slot locations for the card. While it is perfectly acceptable to slot punch your access cards, we strongly suggest using badge grippers or clamps instead. These attachment devices work the same as slot clips, and better maintain the structural integrity of your technology card.

If you must slot punch the card, carefully center the indicator marks to the punch, and punch only where the indicator marks appear. Any other position may damage the interior circuitry and thus cause the card not to work.

Always test the first card after printing and slotting. Once you are satisfied with the results you can go ahead and print the rest of the batch. For more information contact an expert at Safe-Card ID Services today.

 

HID Global Acquires EasyLobby For Secure Visitor Management Solutions

IRVINE, Calif., – January 3, 2012 – HID Global, a trusted leader in solutions for the delivery of secure identity, today announced the company has acquired EasyLobby, the industry leader in secure visitor management solutions. The acquisition delivers a number of potential synergies with HID Global’s portfolio across its identity and access management business.

EasyLobby is the pioneer and market-leading provider of comprehensive visitor management solutions. The company’s product suite provides enterprise-class visitor registration, tracking, reporting, badge printing, asset and package management, web-based pre-registration, and employee/contractor time and attendance functionality, and is tightly integrated with a wide variety of access control, human resources and other systems. EasyLobby products complement and extend HID Global’s portfolio, and have been deployed across a large and diverse base that is well-aligned with HID Global’s physical access control customer base.

EasyLobby is a strategic acquisition that delivers strong potential synergies across multiple high-value market segments,” said HID Global president and CEO Denis Hébert. “The addition of EasyLobby’s product suite, large installed base and strong customer engagements will enable us to broaden our offering to include trusted solutions for a wide range of visitor management applications. Additionally, this acquisition brings us a talented team with a highly complementary skillset.”

“We are very excited to become part of HID Global, a global company at the very heart of the security industry. This combination adds industry-leading secure visitor management solutions to the world’s most comprehensive offering of physical access control and secure card issuance systems,” said Howard Marson, EasyLobby CEO. “Together, our extended range of products creates a highly differentiated portfolio that will drive new opportunities for our mutual customers and partners, across all geographic regions of the world.”

For more information about Visitor Management give an expert at Safe-Card ID Services a call at 888-485-4696.

Using ID Cards for More than Just ID

Most photo identification cards that are printed with our photo ID card printer systems are used for the purpose of identification. Printed plastic cards commonly have a company logo, card holder photo and specific custom information about the person carrying the ID card. The cards may be full color on one or both sides. This is determined by the type of printer you have and also the type of print ribbon that is used.

Small business typically use plastic ID cards as identification for their employees or group members. Larger businesses and government frequently purchase professional, security oriented ID card printer systems that allow the identification to be used for more than just ID.

Printed plastic cards are commonly known for identification. They also benefit businesses in the areas of physical and virtual access, debit functions, payroll and more.

When you know what you want to use your ID cards for and if you know your budget limit, there are ways to make your card produce information you want to benefit company outcomes. There are many ways to integrate custom data in plastic cards. Some of these methods can be developed with a standard entry level ID card printer and software while others need a specialized system.

Current top of the line identification cards that are used for more than one purpose are the contactless or contact smart card. These cards are more common in other parts of the world and are rapidly making entry into the United States. These cards have the capability to hold a large amount of data that can easily transmit to card readers. The card readers then submit that information to control systems for analysis and further use.

A more common way of storing data on a plastic card is through a magnetic strip that is found on PVC cards. Information can be encoded into the tracks of the magnetic strip. Mag stripe readers can transfer information to control systems when the stripe is swiped through the reader. A common example of this is a credit or debit card swipe at a retail outlet. This system can also be used for transfer, access, loyalty systems and more.

Another method of storing information is available. This is with the use of a bar code printed on the outside of the card. The bar code is not able to store as much information as a contact or contactless card or as a mag stripe card. It is useful for time and attendance or for debit card type functions. It is the most cost effective way of storing information that is not legible to a casual observer of the card.

HID Access Cards – How They Work

An HID proximity card is a card with embedded information encoded inside. The information transmitted can allow door activation or login to a networked computer system. With access card systems, reports can be generated to provide specific details as to which card holders have attempted access and which cards have activated entry.

The HID Prox card holds information embedded inside and has capability within an access system to activate a door or log someone into a computer network. The proximity card does not have the capability of accessing an area within itself. The card within the framework of an access system will provide security and appropriate access to a controlled area.

The card is combined with a card reader, access control panel and a computer to form a complete access system. In combination, the system is able to function as a security officer that allows card holders into specific secured doors at certain dates and times.

The card holds an embedded binary code, which is a sequence of ones and zeros. These are used in a specific sequence to identify a card holder. The coding format is transmitted from the card reader to the control panel for deciphering. The card may or may not have additional code embedded in the card. The access control panel normally does not use extra coding, but reviews the formatted code utilized in the system.

When the controller receives the data, it begins the steps to verify if the cardholder has access to the building. The length of the data string is analyzed prior to proceeding. If the format is different, the control panel will not be able to process the request.
Once the format is verified, the controller can then check the facility code and site code for a match. If this is true, the controller moves ahead to match the card number. A matching card number will move the analysis forward. The information is then reviewed to see if the card holder has authorization to access during the date and time the access request is made. If so, the lock relay will activate and the door or network will unlock for access.

If the HID prox card is not able to successfully move through the above steps, access is denied. The system may provide a specific response from the controller or there may not be any response at all.

The software application processing authentication transactions can be accessed by authorized personnel to updated cardholder information, configure hardware and to generate reports of access attempts and successes.