130 likes | 332 Views
HID Global is the leading brand in access control and secure ID solutions. Here, we discuss the details behind the technology used in the implementation of HID Prox Cards. You can find more information at http://www.securitystoreusa.com/search?t=HID PROX CARD<br>
E N D
Introduction to HID HID is one of the best-selling manufacturers of proximity (or prox) cards. It was found in 1991 as Hughes Identification Devices, and changed to its current name in 1995. It was acquired by AssaAbloy in 2000.
What Are Proximity Cards? Prox cards are contactless smart cards that can be read by a compatible reader. These cards don’t need to be inserted into the reader to be read. They are normally used to allow access to restricted areas by unlocking passages.
How to Unlock a Door with a HID Prox Card? The card is first brought close to the card reader. The reader detects the credentials fed into the prox card. After successful verification, the reader sends a notification to a central access control panel. The control panel then unlocks the door.
Inside HID Prox Cards A generic HID prox card has 3 internal components – an integrated circuit, a coil of wire and a capacitor. The embedded chip (IC) stores the user’s credentials. The coil along with the capacitor act as a tuned circuit that interacts with the card reader. Passive cards, which are the most common variants in use, don’t need any internal power source to function.
Card Access Systems A card access system consists of 4 basic elements: Prox Card, reader, access control system and a host PC. The host PC stores all the access details of the card access system. Access control systems help card readers in validating prox cards by checking data from the host PC. Some card readers have keypads for added security.
Proximity Card Standards Prox cards are covered by ISO/IEC 14443 and/or ISO/IEC 15693 standards. These standards determine the range of the prox cards. ISO/IEC 15693 works up to long ranges of 0.97 yards (35 inches).
Steps to Authenticating a Prox Card The card contains formatted binary code which is converted into protocol by the card reader. The protocol is transmitted to the access control panel for authentication. The system then checks the data against the main database. Access is granted only when the data match.