Posted on Leave a comment

HID Access Card Printing Tips

When printing your HID Access cards follow these instructions to achieve best results. Start by printing a test card with a regular CR80 PVC Card to ensure your template and design are up to your standards, then;

– Always check cards for manufacturing debris. Sometimes there are small pieces of vinyl on the card. Carefully clean cards using 99% pure Isopropyl alcohol and a soft, lint free cloth.

– The office where you print the cards should be neat, clean and free of airborne particles. If not purchase a dust cover for when the printer is not in use.

– Check the printer’s roller frequently. Clean the printer roller after printing 50 cards (or fewer).

– Fine scuff marks may appear on the surface of cards. These marks do not affect the printer, nor the printed images. These scuff marks occur during final inspection and testing.

– Printer manufacturers discourage printing cards which are pre¬punched. The slot edge may tear the printer ribbon or interfere with card position sensors. Therefore, print your cards first, then slot punch them. For cards that are already punched, do not print in the area near the slot. If the card has an embedded contact chip, keep the printing at least .0625 in [1.5875 mm] away from its edges.

As always for information contact an expert at Safe-Card ID Services today.

Posted on Leave a comment

Proper Access/HID Card Slotting

Access or proximity cards will have slot punch indicators, small dots visible on the card back
which show the only allowable slot locations for the card. While it is perfectly acceptable to slot punch your access cards, we strongly suggest using badge grippers or clamps instead. These attachment devices work the same as slot clips, and better maintain the structural integrity of your technology card.

If you must slot punch the card, carefully center the indicator marks to the punch, and punch only where the indicator marks appear. Any other position may damage the interior circuitry and thus cause the card not to work.

Always test the first card after printing and slotting. Once you are satisfied with the results you can go ahead and print the rest of the batch. For more information contact an expert at Safe-Card ID Services today.

 

Posted on Leave a comment

HID Access Cards – How They Work

An HID proximity card is a card with embedded information encoded inside. The information transmitted can allow door activation or login to a networked computer system. With access card systems, reports can be generated to provide specific details as to which card holders have attempted access and which cards have activated entry.

The HID Prox card holds information embedded inside and has capability within an access system to activate a door or log someone into a computer network. The proximity card does not have the capability of accessing an area within itself. The card within the framework of an access system will provide security and appropriate access to a controlled area.

The card is combined with a card reader, access control panel and a computer to form a complete access system. In combination, the system is able to function as a security officer that allows card holders into specific secured doors at certain dates and times.

The card holds an embedded binary code, which is a sequence of ones and zeros. These are used in a specific sequence to identify a card holder. The coding format is transmitted from the card reader to the control panel for deciphering. The card may or may not have additional code embedded in the card. The access control panel normally does not use extra coding, but reviews the formatted code utilized in the system.

When the controller receives the data, it begins the steps to verify if the cardholder has access to the building. The length of the data string is analyzed prior to proceeding. If the format is different, the control panel will not be able to process the request.
Once the format is verified, the controller can then check the facility code and site code for a match. If this is true, the controller moves ahead to match the card number. A matching card number will move the analysis forward. The information is then reviewed to see if the card holder has authorization to access during the date and time the access request is made. If so, the lock relay will activate and the door or network will unlock for access.

If the HID prox card is not able to successfully move through the above steps, access is denied. The system may provide a specific response from the controller or there may not be any response at all.

The software application processing authentication transactions can be accessed by authorized personnel to updated cardholder information, configure hardware and to generate reports of access attempts and successes.