General Industry Info

News from Allegion: Smart Cards Offer Many Advantages

Screen shot 2014-09-23 at 10.39.54 AMSmart cards offer many advantages over proximity cards

Proximity readers and cards have been on the market for over 25 years. As the first contactless card that can be “read” without inserting or creating contact with a reader, proximity cards advanced credentials forward significantly.

However, proximity cards are not without their limitations. Namely, storage and security. The storage on proximity cards is limited to the card number alone—making it functional for only one purpose. Additionally, proximity technology is highly susceptible to counterfeits and duplication.

Smart card technology solves both issues.

  • Storage: There are multiple sectors on a smart card, allowing for storage of several different types of applications, including access control, POS, computer access, data storage and cashless vending. Smart cards can be used for multiple purposes and are 100 times faster than proximity credentials.
  • Security: With advanced data encryption, duplication is nearly impossible. As an added level of security, smart technology requires mutual authentication—between the card and reader.

Making the transition
It’s fairly simple to transition to smart cards on existing systems. Allegion’s aptiQ™ Multi-Technology Readers allow companies to move at their own pace because they read both 125 kHz proximity and 13.56 MHz contactless smart cards in a single unit. Even more, Allegion’s aptiQ readers are very easy to install or replace with a quick-connect design that uses standard wiring.

Read more industry insights regarding sorting through credential technology choices by Allegion.

Want more information on Allegion’s aptiQ smart card technology? Contact Sheila Brown today!

HID Global Upgrade Requires Firmware Update beginning October 31, 2013

HID Global will be upgrading the RFID communication technology utilized by some print ribbon and overlaminate consumables used in FARGO Card Printer/Encoders beginning in October 2013. After HID implements the new technology, most in-field printers and laminators that were manufactured before mid-2010 will require a firmware update to ensure compatibility with the new consumables technology.

Affected printer models include:

  • FARGO DTC300 and M30/M30e
  • Persona C30/C30e
  • FARGO DTC400/DTC400e
  • FARGO DTC550 and DTC550-LC
  • FARGO HDP5000 and HDP5000-LC
  • FARGO DTC4500-LC

To make this transition as seamless as possible for you and your end-user customers, HID is taking the following actions:

Channel partners:

  • Technical support – HID will offer channel partners and end-users support during this transition. Please visit for support.
  • End-user letter – Written by HID, this letter can be passed along to your customers to alert them to the changes.
  • FAQ – This document will help answer questions that you or your customers may have.
  • Early channel notification – HID will not begin the transition process until October 2013.
  • Workbench 3.0 Utility – Available at for free, this utility will easily allow end users to update printer firmware and drivers.

End-user Customers:

  • After the transition occurs, HID will communicate the requirement to update firmware to end-user customers via a slip sheet that is added to the print ribbon and overlaminate consumables for the affected product lines.

Additionally, all affected printer model lines manufactured since mid-2010 have been shipped from HID Global with firmware that will support the new RFID communication technology. Therefore, many current printer users who purchase consumables with the new RFID communication technology will not need to update their firmware.

Users who are impacted by the change will receive an error message when trying to use new consumables in affected printers. These users will be required to update the printer and/or laminator firmware to add support for HID’s new RFID technology. HID will provide technical support for you and for your customers via our website. The support URL will be included in the packaging of all consumables using the new RFID technology after the transition has occurred.

If you have any questions regarding this transition, we can be reached at 317-488-1030 or

HID: Moving Toward a More “Frictionless” Security Experience

Posted on HID’s Blog on 04/19/13
by Debra Spitler

The move to a more “frictionless” security experience, meaning a security experience that does not slow users down, is one of the key trends HID Global anticipates will drive the industry in 2013. One way to remove friction is to embed credentials inside Near Field Communications (NFC)-enabled smartphones and other mobile devices, so that users needn’t carry separate cards, keys and tokens. This not only removes friction but also meets the need for improved cost and convenience. For instance, organizations can still benefit from the use of strong authentication as a primary security pillar, without forcing employees to carry a dedicated security token. Instead, the token is on the user’s phone, which can also be used to open doors and conduct other secure transactions.

To make this frictionless security experience a reality, credentials will be embedded into NFC-enabled phones, and identity management will move to the cloud. Organizations will enable frictionless user login using both Software as a Service (SaaS) as well as internal enterprise applications. In a Bring Your Own Device (BYOD) environment, employees will be able to use their personal devices. Cloud security becomes a critical ingredient. While much of today’s focus is on securing the platform, it will also be critical to resolve challenges around provisioning and revoking user identities across multiple cloud-based applications, while enabling secure, frictionless user login to those applications.

HID Global has worked with pilot partners including Netflix® and Good Technology™ to test some of these frictionless security concepts in the enterprise. The goal was to see how users would react to a mobile access control model, with cloud-based provisioning of digital keys and credentials. Both companies realized that people carry their phones everywhere and consider them to be almost like an extension of their ID (having conversations, conducting bank transactions, storing photos). This makes the devices an extremely convenient access control platform.

Frictionless access control requires more than convenience; solutions also must be easy to use. HID Global’s enterprise pilot participants found mobile access control to be as easy as using a traditional plastic card. Another requirement identified by pilot participants was a high level of device choice. This creates the need for widely available NFC-enabled phones and solutions that are based on open standards to simplify adoption, especially in a world of BYOD deployment and IT consumerization. Frictionless access control solutions based on open standards will also future-proof the access control infrastructure, ensuring that investments in today’s technologies can be leveraged in the future.

In addition to delivering the convenience and simplicity of frictionless security, the industry will also need to define best practices for managing and supporting today’s influx of BYOD mobile phones. Authentication from a personal device to an application on a corporate network or in the cloud will be critical. It also will be critical to ensure the personal privacy of BYOD users, while protecting the integrity of enterprise data and resources.

As we meet these challenges, we will deliver an increasingly frictionless security experience in a new era of cloud-based applications and services. This experience can spread rapidly as we take advantage of the smartphone’s on-board intelligence. Consider the possibilities for physical access control, alone. Today, approximately 5 percent of all facility doors have some sort of electronic access control. The rest are unsecured, or secured by a mechanical lock and key. When we let NFC-enabled smartphones serve as both the key and the rules engine that makes the access control decision, we could see more than five times that number secured and delivering a frictionless mobile experience in the future.

HID article: Inline Smart Card Personalization

Posted: 02/07/13 by Nils Wahlander

Implementing smarter smart card issuance with inline personalization

No longer a novelty, smart cards are a part of daily life for many of us. It’s becoming increasingly difficult to find “dumb” ID badges personalized only with a color photo and black text that function simply to help others visually verify that we are who we say we are. Today’s smart IDs serve not only as photo identification, but also as access cards, debit cards and even mass transit passes in major cities across the world.

End users who manage the issuance of these smart cards to individuals in their organizations routinely synch up data that’s pre-programmed into the card’s electronics with personal data that gets printed onto the outside of the card. Specifically, within an organization’s database, an employee record containing a photograph, name and ID number gets updated to include a unique card ID number that was pre-programmed into a contactless card (and typically pre-printed onto the card’s surface) by a access card manufacturer or a system integrator.

How quickly and accurately the cardholder’s personal information is updated with the access card’s unique ID number varies. Many organizations’ first step is to use a desktop card printer to add color and text to a card’s exterior. Next, they extract the card from the printer’s output bin, turn to their computer and manually type the pre-printed/pre-programmed ID number into that cardholder’s record in the database. If their system is slightly more automated, they may have an external desktop reader on which they can tap the smart card in order to electronically copy its ID number into the cardholder’s record.

This two-step process is used so frequently that card issuers have grown accustomed to synchronizing their cards this way, even though it adds time to the issuance process and increases the potential for keying errors. Often when a typing error is made, it is not discovered until the cardholder attempts to enter a facility and is denied access, which compounds the error and adds even more time to the issuance process.

Today, the tools enabling issuers to move away from the outdated two-step process into one, inline smart card personalization process are readily available. In an inline personalization process, users submit a card into a desktop printer equipped with an internal smart card encoder, and in one seamless step the printer/encoder personalizes the card inside and out. This inline process saves time so issuers can focus on other tasks, increase card throughput and effectively reduce errors that commonly occur during the synchronization process.

Nearly all major card printer manufacturers offer the option to build card readers/encoders into the machines, and offer card issuance software that is compatible with the integrated system. If an organization already owns a card printer, it can usually be upgraded with an encoder in the field.

By integrating readers/encoders into card printer hardware, organizations position themselves to leverage the benefits of smart card applications well into the future. And when they’re ready to maximize their smart cards’ functionality, they’ll already have the smart issuance part of the equation figured out.

Tagged ,

Spice up your ID with a QR Code

Quick Response, or QR, codes are 2-dimensional bar codes. They are reliable and have a large capacity for storing anything from organization data to access control to contract information (replacing your old business cards) all which can be read by an app on your SmartPhone or by a bar code reader.

You can add a QR code to your photo ID to support your business requirements. In order to do so effective, consider Jolly’s ID Flow card design software or ask ASAP to produce your IDs for you. We just need your raw data and we can produce specialized tags loaded with your data quickly and affordably.

Contact ASAP Identification at 317-488-1030 or to learn more.

Tagged , , , , , ,

Jolly Technologies ID Software Packages

Jolly Technologies offers a wide variety of software packages that enable you to design your ID badges and labels, help with your visitor management efforts, and track your assets.  The link below contains a series of demos for those packages.  Please take a look at the ID badge and visitor management software packages and give us a call at (317) 488-1030 if you have any questions.

CLICK HERE for Software package demos.

Tagged , , , , , , , , , ,

Understanding Corporate 1000

Read HID’s Understanding Corporate 1000 whitepaper to learn more about:

  1. What is a Format?
  2. Unique Corporate 1000 Formats
  3. Access Control System Compatibility
Tagged , , , , , , ,

Corporate 1000 Program

HID’s Corporate 1000 Program gives security professionals the ability to standardize on a “Single Card Solution,” providing timely and educational information to end-users regarding the securing of people, property and assets. This program insures that advanced RFID technological solutions continue to be developed to meet the demands of ever-changing dynamics in the workplace.

HID’s Corporate 1000 program allows companies to standardize on one card for the access control systems. See below for answers to common questions about the Corporate 1000 program. You may also call HID at (800) 237-7769 and ask for Technical Support or you may complete the Corporate 1000 Program Feedback Form on this website. Either way, your questions will be promptly answered.

Are you printing your own photo ID badges? Consider HID’s Card Personalization Service, an economical and secure alternative to in-house card production.

Click here to view HID’s Corporate 1000 Program FAQs.

Tagged , , , ,

Managing Your Physical Access Control System

For anyone thinking of using a HID Prox/iClass Card, or even for those already using a HID Prox/iClass Card, the article, Key management for physical access control, from outlines some great points to keep in mind as you manage your physical access control system.

This article gives detailed information on Key Management Fundamentals, including:

  • Key Generation
  • Key Use
  • Key Breach
  • Key Management Benefits

To read the entire article, click here.

Tagged , , , , , , , ,

Fargo Asure ID Updated

Fargo Asure ID, originally introduced in 2009, has been updated. Fargo began shipping Asure ID 7 in April of this year. Asure ID 7 maintains the same interface and enhanced user experience as the original, but it is now even more intuitive than before with added functionality that extends ease of use, convenience and productivity. The great news for all registered users of Asure ID 2009 is that you can upgrade to Asure ID 7 for free. In addition, new customers can take a Asure ID 7 free test drive for 30 days. Please give us a call if you want to learn more.

Tagged , ,