Building, facility and device access is frequently controlled by use of an access-control system. Such systems include the provision of proximity access cards, fobs, and other devices to an organization’s designated personnel. These devices contain specialized memory chips that are programmed with unique identifying information, which is then read by compatible readers. When a proximity device is held close to the reader, the unique, encoded information is transmitted to an access system controller. If rules and criteria defined in the access software is met, the cardholder’s access to the protected area or device is granted.
Each access card is uniquely coded prior to distribution to card holders. The access-control software is programmed to allow access to cardholders only at certain times, on days, or only to certain areas or devices. This then allows organizations to create unique access profiles for each and every card and cardholder, if so desired. Of course, you can assign cards and card-holders to pre-defined access groups, making card management simple and manageable.
Certain types of proximity access devices can also be used for photo identification. By using ISO printable access cards or 10 ml pressure sensitive overlays on “clamshell” style cards, standard ID-card printing systems are able to add identity information to the proximity card itself. For organizations that require both visual identification AND physical access control, this is a powerful combination.
Read more about how HID prox cards work.
Current Fargo printers that will allow encoding of proximity cards and identification card printing in the same pass are the Fargo HDP5000, Fargo DTC4500e, and the Fargo DTC4250e printers. For information about cards that can be integrated with identification applications, visit our HID prox card page.
Pingback: How an HID Prox Card Works | SafeCardID.com
Pingback: ID Card Glossary « ID Card Blog