Posted on Leave a comment

Proper Access/HID Card Slotting

Access or proximity cards will have slot punch indicators, small dots visible on the card back
which show the only allowable slot locations for the card. While it is perfectly acceptable to slot punch your access cards, we strongly suggest using badge grippers or clamps instead. These attachment devices work the same as slot clips, and better maintain the structural integrity of your technology card.

If you must slot punch the card, carefully center the indicator marks to the punch, and punch only where the indicator marks appear. Any other position may damage the interior circuitry and thus cause the card not to work.

Always test the first card after printing and slotting. Once you are satisfied with the results you can go ahead and print the rest of the batch. For more information contact an expert at Safe-Card ID Services today.

 

Posted on Leave a comment

HID Global Acquires EasyLobby For Secure Visitor Management Solutions

IRVINE, Calif., – January 3, 2012 – HID Global, a trusted leader in solutions for the delivery of secure identity, today announced the company has acquired EasyLobby, the industry leader in secure visitor management solutions. The acquisition delivers a number of potential synergies with HID Global’s portfolio across its identity and access management business.

EasyLobby is the pioneer and market-leading provider of comprehensive visitor management solutions. The company’s product suite provides enterprise-class visitor registration, tracking, reporting, badge printing, asset and package management, web-based pre-registration, and employee/contractor time and attendance functionality, and is tightly integrated with a wide variety of access control, human resources and other systems. EasyLobby products complement and extend HID Global’s portfolio, and have been deployed across a large and diverse base that is well-aligned with HID Global’s physical access control customer base.

EasyLobby is a strategic acquisition that delivers strong potential synergies across multiple high-value market segments,” said HID Global president and CEO Denis Hébert. “The addition of EasyLobby’s product suite, large installed base and strong customer engagements will enable us to broaden our offering to include trusted solutions for a wide range of visitor management applications. Additionally, this acquisition brings us a talented team with a highly complementary skillset.”

“We are very excited to become part of HID Global, a global company at the very heart of the security industry. This combination adds industry-leading secure visitor management solutions to the world’s most comprehensive offering of physical access control and secure card issuance systems,” said Howard Marson, EasyLobby CEO. “Together, our extended range of products creates a highly differentiated portfolio that will drive new opportunities for our mutual customers and partners, across all geographic regions of the world.”

For more information about Visitor Management give an expert at Safe-Card ID Services a call at 888-485-4696.

Posted on Leave a comment

HID Access Cards – How They Work

An HID proximity card is a card with embedded information encoded inside. The information transmitted can allow door activation or login to a networked computer system. With access card systems, reports can be generated to provide specific details as to which card holders have attempted access and which cards have activated entry.

The HID Prox card holds information embedded inside and has capability within an access system to activate a door or log someone into a computer network. The proximity card does not have the capability of accessing an area within itself. The card within the framework of an access system will provide security and appropriate access to a controlled area.

The card is combined with a card reader, access control panel and a computer to form a complete access system. In combination, the system is able to function as a security officer that allows card holders into specific secured doors at certain dates and times.

The card holds an embedded binary code, which is a sequence of ones and zeros. These are used in a specific sequence to identify a card holder. The coding format is transmitted from the card reader to the control panel for deciphering. The card may or may not have additional code embedded in the card. The access control panel normally does not use extra coding, but reviews the formatted code utilized in the system.

When the controller receives the data, it begins the steps to verify if the cardholder has access to the building. The length of the data string is analyzed prior to proceeding. If the format is different, the control panel will not be able to process the request.
Once the format is verified, the controller can then check the facility code and site code for a match. If this is true, the controller moves ahead to match the card number. A matching card number will move the analysis forward. The information is then reviewed to see if the card holder has authorization to access during the date and time the access request is made. If so, the lock relay will activate and the door or network will unlock for access.

If the HID prox card is not able to successfully move through the above steps, access is denied. The system may provide a specific response from the controller or there may not be any response at all.

The software application processing authentication transactions can be accessed by authorized personnel to updated cardholder information, configure hardware and to generate reports of access attempts and successes.