Access Control Manager Admin Guide

Total Page:16

File Type:pdf, Size:1020Kb

Access Control Manager Admin Guide Admin Guide Access Control Manager™ Software Version 5.12.2 © 2016- 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON 5.12.2, ACC, ACCESS CONTROL MANAGER, ACM and ACM VERIFY are trademarks of Avigilon Corporation. HID, HID GLOBAL, APERIO and VERTX are trademarks or registered trademarks of HID Global, ASSA ABLOY AB, or its affiliate(s) in the US and other countries. Linux is a registered trademark of Linus Torvald in the US and other countries. Firefox is a trademark of the Mozilla Foundation in the US and other countries. Other names or logos mentioned herein may be the trademarks of their respective owners. The absence of the symbols ™ and ® in proximity to each trademark in this document or at all is not a disclaimer of ownership of the related trademark. Avigilon Corporation protects its innovations with patents issued in the United States of America and other jurisdictions worldwide (see avigilon.com/patents). Unless stated explicitly and in writing, no license is granted with respect to any copyright, industrial design, trademark, patent or other intellectual property rights of Avigilon Corporation or its licensors. This document has been compiled and published using product descriptions and specifications available at the time of publication. The contents of this document and the specifications of the products discussed herein are subject to change without notice. Avigilon Corporation reserves the right to make any such changes without notice. Neither Avigilon Corporation nor any of its affiliated companies: (1) guarantees the completeness or accuracy of the information contained in this document; or (2) is responsible for your use of, or reliance on, the information. Avigilon Corporation shall not be responsible for any losses or damages (including consequential damages) caused by reliance on the information presented herein. Avigilon Corporation avigilon.com PDF-ACM-ADM-5.12.2-A Revision: 1 - EN 20190220 2 Table of Contents Introduction 14 Monitoring 15 Monitoring Events 15 Pause/Resume Events 16 Clear Events 16 View Live Video 16 View Recorded Video 17 Create Event Notes 17 View Event Notes 18 View Event Instructions 18 View Event Identity Details 18 View Event History 19 Change Events List Settings 19 Reconnect to Events List 19 Searching for Events and Alarms 20 View Camera (Search) 21 View Recorded Video (Search) 21 Create Event Notes (Search) 22 View Event Notes (Search) 22 View Event Instructions (Search) 23 View Event Identity Details (Search) 23 View Event History (Search) 23 Change Transactions List Settings 24 Monitor Alarms 24 Acknowledge Alarms 25 View Live Video (Alarms) 25 View Recorded Video (Alarms) 26 Create Event Notes (Alarms) 26 View Event Notes (Alarms) 27 View Event Instructions (Alarms) 27 View Event Identity Details (Alarms) 27 View Event History (Alarms) 28 Change Alarms List Settings 28 Monitor - Verification screen 29 Verifying Identities at Doors 29 3 Verification Events List 30 Monitor - Dashboard 31 Panels table 32 Doors table 33 LifeSafety Panels table 35 Controlling System Hardware 36 Status Colors 37 Monitor Screen - Map Templates page 38 Using a Map 38 Add Map 41 Monitor Intrusion Panels 41 Monitor Intrusion Panel Status 41 Monitor Intrusion Panel Areas 42 Monitor Intrusion Panel Points 43 Monitor Intrusion Panel Outputs 44 Identities 46 Searching for an Identity 46 Adding an Identity 47 Identities - Assigning Roles 48 Identities - Assigning Tokens 49 Identities - Assigning Groups 49 Capturing and Uploading Photos of an Identity 50 Identities - Creating Badges 55 Timed Access 55 Adding Timed Access to an Identity 57 Editing Timed Access 57 Deleting Timed Access 57 Editing an Identity 58 Reports 59 Reports - Generating Reports 59 Reports - Report Preview 59 Reports - Editing 60 Reports - Editing Audit Log and Transaction Reports 61 Reports - Creating Custom Reports 62 Reports - Creating Custom Audit Log and Transaction Reports 63 Physical Access 64 4 Configuring Templates (Mercury Security) 64 Door Templates 65 Door Templates - Batch Update 65 Door Templates list page 66 Door Templates - Add page 66 Door Templates - Edit page 68 Door Templates - Batch Update 70 Reader Templates 71 Reader Templates list page 71 Reader Template: Add page 71 Reader Template: Edit page 74 Input Templates 77 Input Templates list page 77 Input Template: Add page 77 Input Template: Edit page 79 Output Templates 80 Output Templates list page 81 Output Template: Add page 81 Output Template: Edit page 82 Wiring Templates 83 Wiring Templates list page 83 Wiring Template: Add page 83 Wiring Template: Edit page 84 Configuring Panels 85 Searching for Panels 86 Adding Panels 86 Configuring the Mercury Security MS Bridge Solution 87 Batch Creating Subpanels on a New Mercury Panel 87 Subpanel: Batch Create page (Mercury Security) 88 Subpanel: Batch Edit Details page (Mercury Security) 89 Subpanel: Batch Name Doors or Subpanel: Batch Create Summary page (Mercury Security) 90 Adding HID VertX® Subpanels 90 Adding Mercury Security Panels 90 Editing Panels 91 Editing HID® VertX® Panels 91 Editing Mercury Security Panels 91 5 Resetting Anti-Passback from the Panel 92 Downloading Parameters 92 Downloading Tokens 92 Lenel Panel Support 92 Resetting Doors/Subpanels 93 Updating Panel Firmware 93 Updating Panel Time 94 Deleting Panels 94 Configuring Subpanels 94 Adding a Subpanel 95 Editing Subpanels 96 Inputs 96 Output Operating Modes 97 Outputs 97 Deleting Subpanels 98 Macros 98 Adding Macros 99 Editing Macros 99 Deleting Macros 99 Assigning Macros 99 Assigning a Macro to a Trigger 100 Assigning a Macro to a Macro 100 Assigning a Macro to a Door 100 Sorting Macros 100 Triggers 101 Adding Triggers 101 Editing Triggers 101 Deleting Triggers 101 Configuring Doors 101 Searching for Doors 102 Advanced Filtering on the Doors List 103 Controlling Doors 103 Adding Doors 104 Adding Simple Macros 106 Editing Doors 106 Doors - Editing VertX® Doors 107 Doors - Editing Mercury Security Doors 107 6 Deleting Doors 108 Door Modes 108 Access Types 108 Anti-Passback 109 Anti-Passback Modes 109 Setting Up Anti-Passback 110 Granting a Free Pass 111 Global Anti-Passback 112 Global Anti-Passback Modes 112 Interlocks 113 Adding Interlocks 115 Editing Interlocks 115 Configuring Locks 115 Configuring Assa Abloy Aperio® Wireless Lock Technology 115 Configuring Allegion Schlage AD400 Series Locks 116 Configuring Allegion Schlage LE Series Locks 117 Configuring Allegion Schlage NDE Series Locks 118 Configuring SimonsVoss Wireless Locks 119 Doors list 123 Door: Add page 125 Options for an Avigilon Door 127 Options For VertX® and Mercury Security Doors 127 Door Processing Attributes for VertX® Doors 128 Door Processing Attributes for Mercury Security Doors 129 Doors - VertX® New Parameters page 130 Doors - Mercury Security New Parameters page 132 Doors - Edit Screen 135 Door: Edit page (VertX® ) 135 Parameters tab (VertX® ) 135 Operations tab (VertX®) 137 Hardware tab (VertX®) 140 Reader Edit page (VertX®) 142 Input Edit page (VertX®) 143 Output Edit page (VertX®) 144 Cameras tab (VertX®) 144 Events tab (VertX® doors) 146 Doors - Creating Local Events for VertX® Doors 147 7 Access tab (VertX® ) 148 Transactions tab (VertX® ) 149 Door: Edit page (Mercury Security) 149 Parameters tab (Mercury Security) 149 Operations tab (Mercury Security) 152 Hardware tab (Mercury Security) 156 Reader Edit page (Mercury Security) 158 Input Edit page (Mercury Security) 161 Output Edit page (Mercury Security) 162 Elev tab (Mercury Security) 162 Cameras tab (Mercury Security) 163 Live Video Window 165 Interlocks tab (Mercury Security ) 165 Interlocks Add page 167 Interlock Edit page 169 Events tab (Mercury Security doors) 170 Doors - Creating Local Events for Mercury Security Doors 171 Access tab (Mercury Security) 172 Transactions tab (Mercury Security) 173 Doors - Access page 173 Configuring ACM Verify™ Virtual Doors 173 Adding an ACM Verify Door 173 Parameters tab (Avigilon) 174 Paired Devices 175 Prerequisites for Pairing Devices 176 Precautions for Paired ACM Verify Stations 176 Pairing a Device 176 Using ACM Verify 177 Configuring Areas 178 Adding Areas 180 Areas - Editing 180 Areas - Deleting 180 EOL Resistance 180 Adding EOL Resistance for Mercury Input Points 181 Adding EOL Resistance for VertX® Input Points 181 Editing EOL Resistance for Mercury Input Points 181 Editing EOL Resistance for VertX® Input Points 181 8 Mercury LED Modes - List page 181 Editing Mercury Security LED Modes 182 Mercury Security LED Mode Table page 182 LED Modes for Mercury Security 183 Configuring Card Formats 185 Adding Card Formats 186 Editing Card Formats 186 Deleting Card Formats 186 Configuring ACM System Events 186 Searching for ACM System Events 187 Customizing ACM System Events 187 Assigning Priority Colors to ACM System Events 187 Global Actions 189 Global Actions - Adding 189 Global Actions - Editing 189 Global Actions - Action Types 189 Global Actions - Deleting 190 Global Actions - Intrusion Linkages and Actions 190 Intrusion panel alarm due to an event in the ACM System 190 Disable/enable doors from keypad 190 Disarm Alarm on Access Grant with restricted authorities 191 Global Linkages - Introduction 191 Global Linkages - Adding 192 Global Linkages - Editing 192 Mustering - Introduction 192 Mustering - Requirements 192 Mustering - Creating a Dashboard 193 Mustering - Using the Dashboard 194 Mustering - Manually Moving Identities 196 Managing Appliances 197 Appliances - Changes 197 Adding Extra Appliances 197 Editing Appliances 197 Deleting
Recommended publications
  • Wiegand Converter Board Manual
    Wiegand Converter Configuration Utility User Manual 99009020 Rev B Thank You! Congratulations on the purchase of the Wiegand Converter. RF IDeas knows you will enjoy using the converter board as much as we enjoyed creating and developing it! Configuration is easy so you will be able to quickly take advantage of a more secure environment in your business, school, or organization Please call our Sales department if you have any questions or are interested in our OEM and Independent Developer’s programs. We look forward to your comments and suggestions for our product line! Please go to www.RFIDeas.com and follow the Support a Learning Center link for more details about our product line. We are always discovering new applications for our product line(s). There are several software developer’s licensing our technology so the solution you are looking for may already be developed. Thank you, The RF IDeas Staff Need Assistance? Ph: 847.870.1723 Fx: 847.483.1129 E: [email protected] [email protected] 2 Contents 2 Thank You! 13 Chapter 4: Control Protocol 13 Serial OEM ASCII Control Protocol 4 Chapter 1: The Basics 4 Wiegand Converter Overview 15 Chapter 5: OEM-W2065 Connection Diagrams 5 Chapter 2: Installation 5 Wiegand Converter Installation 17 Chapter 6: Glossary 6 Wiegand Converter Board Layout 8 RS-485/422 Connections 18 Chapter 7: Support 9 Jumper Locations 10 Connectors Locations 23 Index 11 Chapter 3: Lock Connection 24 Other Products and Accessories 11 Push Button Magnetic Lock Connection 12 Magnetic Lock Connection 3 The Basics
    [Show full text]
  • Rfids and Secret Handshakes: Defending Against Ghost-And-Leech Attacks and Unauthorized Reads with Context-Aware Communications
    RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications Alexei Czeskis Karl Koscher University of Washington University of Washington [email protected] [email protected] Joshua R. Smith Tadayoshi Kohno Intel Research Seattle University of Washington [email protected] [email protected] ABSTRACT 1. INTRODUCTION We tackle the problem of defending against ghost-and-leech Radio frequency identification tags (RFIDs) and other con- (a.k.a. proxying, relay, or man-in-the-middle) attacks against tactless cards (like proximity cards and contactless smart- RFID tags and other contactless cards. The approach we cards) are increasing in ubiquity. For example, large corpo- take — which we dub secret handshakes — is to incorpo- rations often use RFIDs or proximity cards to regulate build- rate gesture recognition techniques directly on the RFID ing access. American Express, VISA, and MasterCard all tags or contactless cards. These cards will only engage in produce credit cards with embedded RFID tags. Many car wireless communications when they internally detect these keys also have embedded RFID tags to help protect against secret handshakes. We demonstrate the effectiveness of this hot-wiring. While the security community has invested sig- approach by implementing our secret handshake recognition nificant resources in understanding and addressing the se- system on a passive WISP RFID tag with a built-in ac- curity deficiencies of such cards — including documented celerometer. Our secret handshakes approach is backward attacks against and defensive recommendations for each of compatible with existing deployments of RFID tag and con- the above examples [2, 11, 13] — there exists one class of tactless card readers.
    [Show full text]
  • Strong Authentication
    WHITE PAPER Strong Authentication How to achieve the level of Identity Assurance you need, in a way that’s both convenient and affordable Executive Summary It’s a constant challenge to accommodate all the different access needs of all your users, while simultaneously locking down your resources to protect them from threats. To trust your users are who they say they are and effectively manage their access to your resources, you need a complete identity assurance solution, the foundation of which is strong authentication. The issuance and ongoing management, however, of user credentials, on all the various devices, from smart cards to mobile phones you need to support, for all the applications and resources your users may want to access can pose its own issues. As a result, you need a strong authentication solution that makes it easy for you to issue and manage credentials to provide differing levels of security for differing levels of access in a way that is convenient for the user – anything less negates the effectiveness of the overall solution. WHITE PAPER Strong Authentication 2 Table of Contents 1. Executive summary 3. The need for Strong Authentication in today’s enterprise 3. Defining Strong Authentication to address the challenges of traditional solutions 4. Requirements for effective Strong Authentication – no compromises 5. The approach for a Strong Authentication solution capable of delivering your users the secure access they need 8. ActivID card management system 8. Reaping the benefits of an effective Strong Authentication solution 10. The ActivID difference – peace of mind for users and organisations WHITE PAPER Strong Authentication 3 The need for Strong Authentication in today’s Enterprise Users are increasingly distributed, mobile and varied, requiring many enterprises to take a new look at how to establish trust in a user’s identity and control their access accordingly.
    [Show full text]
  • P2000/P2000LE Security Management System
    P2000/P2000LE Security Management System Web Access Option Version 3.8 and higher, April, 2008 09-9303-01 Revision A P2000/P2000LE Security Management System Web Access Version 3.8 and higher, April, 2008 09-9303-01 Revision A Security Solutions (805) 522-5555 www.johnsoncontrols.com Copyright 2008 Johnson Controls, Inc. All Rights Reserved No part of this document may be reproduced without the prior permission of Johnson Controls, Inc. Acknowledgment Cardkey P2000, BadgeMaster, and Metasys are trademarks of Johnson Controls, Inc. All other company and product names are trademarks or registered trademarks of their respective owners. If this document is translated from the original English version by Johnson Controls, Inc., all reasonable endeavors will be used to ensure the accuracy of translation. Johnson Controls, Inc. shall not be liable for any translation errors contained herein or for incidental or consequential damages in connection with the furnishing or use of this translated material. Due to continuous development of our products, the information in this document is subject to change without notice. Johnson Controls, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with furnishing or use of this material. Contents of this publication may be preliminary and/or may be changed at any time without any obligation to notify anyone of such revision or change, and shall not be regarded as a warranty. TABLE OF CONTENTS Chapter 1: Introduction Chapter Summaries................................................................................................................................
    [Show full text]
  • Pcprox® Plus, Pcprox® Enroll & Wiegand Converter
    pcProx® Plus, pcProx® Enroll & Wiegand Converter Configuration Utility User Manual 99009010 ev A.5 Thank You( Congratulations on the purchase of your pcProx® Enroll, pcProx® Plus, or Wiegand device)s). F ,Deas hopes you en.oy using the readers as much as 0e en.oyed creating and developing them. Configuration is easy, so you 0ill 1e a1le to 2uickly take advantage of a more secure environment in your 1usiness, school, or organi3ation. Please call our Sales department if you have any 2uestions or are interested in our OEM and ,ndependent Developer6s programs. We look for0ard to your comments and suggestions for our product line( Please go to 000. F,Deas.com and follo0 the Support a 7earning Center link for more details a1out our product line. We are al0ays discovering ne0 applications for our product line)s). There are several soft0are developer6s licensing our technology so the solution you are looking for may already 1e developed. Thank you, The F ,Deas Staff 8eed Assistance9 Ph: 847.870.1723 Fx: 847.483.1129 E: Sales@ F,Deas.com TechSupport@ F,Deas.com Alossary Of Terms ASC,,: The American Standard Code for ,nformation ,nterchange codes represent text in computers, communications e2uipment, and other devices that use text. Contactless: The high fre2uency 13.56 MC3 smart card technology. FAC: Facility Access Code OEM: The proximity card and 1adge reader availa1le in selfDcontained electronic modules for easy system integration. pcProx Contactless: The registered F ,Deas 1rand name given to all 13.56 MC3 contactless card reader products. pcProx Proximity: The registered F ,Deas 1rand name given to all 125 kC3 proximity reader products.
    [Show full text]
  • Frequently Asked Questions Readers & Credentials
    Frequently Asked Questions Readers & Credentials Contents: Reader Questions | Credential Questions | Other Questions | Glossary | Acronyms READERS: CREDENTIALS: Why choose smart card technology over What is a credential? proximity? What is a proximity card? What is the difference between proximity What is a contactless smart card? and contactless smart card/reader Why is it smart? technologies? What type of information can I keep on my What is the best way to migrate or transition smart card? from old proximity card technology to newer Why choose smart card technology over contactless smart technology? proximity? What does Multi-Technology mean when Why select smart credentials from Ingersoll referring to a reader? Rand Security Technologies? What are the benefits of multi-technology How does contactless smart card technology readers? compare in price to traditional proximity What are the benefits of aptiQ™ Readers? systems? What technology does aptiQ Can my access control system support smart utilize/support? cards? Why was MIFARE DESFire™ EV1 created Does Ingersoll Rand Security Technologies after MIFARE®? offer proximity cards compatible with HID® What readers are the aptiQ™ smart cards technology? using MIFARE DESFire™ EV1 compatible Will I be able to use one aptiQ™ card to with? perform more than one application such as What is iCLASS®? access control, food service payment, and What is aptiQ™? cashless vending? What is the difference between ISO 14443 I have heard for several years that “smart certification and ISO 15693? card” technology
    [Show full text]
  • Colorado Springs Airport - Cos Sterile/Sida Unescorted Access Badge Media Application Applicant Section: Please Print/Type – Press Firmly
    COLORADO SPRINGS AIRPORT - COS STERILE/SIDA UNESCORTED ACCESS BADGE MEDIA APPLICATION APPLICANT SECTION: PLEASE PRINT/TYPE – PRESS FIRMLY Last Name _________________________________________ First Name _________________________ _ Middle Name ______________________________ (Full Legal Name) (Full Legal Name) (Full Legal Name) Name(s) Previously Used: _______________________________________________________________________________ Gender: Height __________ Weight ___________ Hair __________ Eyes: _________ Race: Place of Birth _______________Citizenship ____________ (Country) (Country) Home Street Mailing Address ____________________________________________________________Daytime Phone: __________________________________ City _______________________________________________________ State ___________________________ Zip _______________________________________ Are you/Have you been badged with any other entity at this airport: If so who and what is/are the badge number(s):_________________________________ Applicants Born outside of the U.S. MUST bring: A Certificate of Naturalization,, a Form DS-1350 Certification of Birth Abroad, a US Passport, a permanent resident card, or a work visa. Forms of ID presented: _______________________________________________________________________________________________________________________________________ APPLICANT SIGNATURE AREA The information I have provided is true, complete, and correct to the best of my knowledge and belief and is provided in good faith. I understand that a knowing and willful false
    [Show full text]
  • Logical Access Solutions
    Logical Access Solutions OMNIKEY® Smart Card Readers The benefits of strong authentication Secure access to business-critical and cloud applications any time, anywhere with OMNIKEY® smart card readers. For today’s dynamic environments, Employees want the convenience of only an easy to use, simple to manage, being able to use a single card to quick- HIGLIGHTS strong authentication solution can ly and easily access the resources they ¡ Complete Interoperability deliver on the requirements of your need to conduct business. organization. To accomplish this, organizations must ¡ Supports any smart card HID Global’s ActivID® solutions give you deploy a solution that can be used to for any application the flexibility you need to support and provide secure access to everything ¡ Supports all relevant secure the wide variety of users in your from the door, to data, and to the organization who are using multiple cloud. They must combine the tradi- operating systems devices to access diverse resources and tionally separate domains of physical ¡ Customized branding applications. and IT security, and management of users’ identities and access into one ¡ Worldwide support The solutions are being used by many credential. of the most security-aware organi- zations worldwide, from government agencies such as the Department of Defense (DoD) to financial and health- care institutions. The benefits of The convergence of IT security strong authentication and physical access control Secure access to data, the door and cloud applications Organizations require the ability to can securely connect users from any lo- This approach enables enterprises to: better control access and employ cation through a variety of devices and ¡ Reduce costs – via a unified card strong authentication throughout authentication methods to help them management solution for both their infrastructure as part of their conveniently get what they need, when physical and logical access multi-layered security strategy.
    [Show full text]
  • Port of Portland Marine Terminal Security Guidelines
    Date: 10 April 2019 Marine Terminal Security Guidelines Revision: 5 Owner: Marine Security PORT OF PORTLAND MARINE TERMINAL SECURITY GUIDELINES TABLE OF CONTENTS INTRODUCTION ADMINISTRATION AND RESPONSIBILITY ...............................................................................1 ADDITIONS, AMENDMENTS, AND CANCELLATIONS .............................................................1 CONSTRUCTION .......................................................................................................................1 OTHER IMPORTANT DOCUMENTS .........................................................................................1 DEFINED TERMS ......................................................................................................................2 1. GENERAL GUIDELINES ................................................................................................5 2. COMPLIANCE REQUIREMENTS ...................................................................................5 2.1 Security Guidelines ..............................................................................................5 2.2 Federal Security Regulations ...............................................................................5 2.3 Security Violation Enforcement ............................................................................6 2.4 Trespassers .........................................................................................................6 2.5 Escort Restrictions ...............................................................................................6
    [Show full text]
  • Pcprox® Enroll & Wiegand Converter
    pcProx® Enroll & Wiegand Converter Configuration Utility User Manual Version 4.4.6 Rev B Thank You! Congratulations on the purchase of your pcProx® 125 kHz Enroll, pcProx® 13.56 MHz Enroll, or Wiegand device(s). RF IDeas hopes you enjoy using the readers as much as we enjoyed creating and developing them. Configuration is easy, so you will be able to quickly take advantage of a more secure environment in your business, school, or organization. Please call our Sales department if you have any questions or are interested in our OEM and Independent Developer’s programs. We look forward to your comments and suggestions for our product line! Please go to www.RFIDeas.com and follow the Support a Learning Center link for more details about our product line. We are always discovering new applications for our product line(s). There are several software developer’s licensing our technology so the solution you are looking for may already be developed. Thank you, The RF IDeas Staff Need Assistance? Ph: 847.870.1723 Fx: 847.483.1129 E: [email protected] [email protected] 2 Contents 2 Thank You! 13 Chapter 3: Software 13 pcProx Software Installation 4 Chapter 1: The Basics 15 pcProx Configuration Utility 4 Wireless Identification Overview 15 Connect Tab 5 ID Card Reader System 17 Timing Tab 5 pcProx Output Formats 18 Set Keystroke Data Tab 7 Credential Form Factors 21 Advanced Tab 8 Card Compatibility 28 Card Formats Tab 8 Reader Configuration Purposes 28 About Tab 29 HWG Files for Device Deployment 9 Chapter 2:Hardware 30 Open a .HWG File 9 What’s In Your Part Number? 10 Interface (Connectors) 32 Chapter 4: Tips and Troubleshooting 11 USB Readers and Wiegand Converters 32 Troubleshooting 11 RS-232 Readers and Converters 32 Precautions 11 Minimum System Requirements 33 Before You Call Technical Support 12 Reader Set-Up Basics 33 Talking To The Technician 12 LED Beeper 34 Appendix 54 Index 55 Other Products and Accessories 3 The Basics 1 Wireless Identification Overview pcProx® Activated Identification Employers are more security conscious than ever.
    [Show full text]
  • Strong Authentication Using Smart Card Technology for Logical Access
    Strong Authentication Using Smart Card Technology for Logical Access A Smart Card Alliance Access Control Council White Paper Publication Date: November 2012 Publication Number: ACC - 12002 Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org Smart Card Alliance © 2012 1 About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org. Copyright © 2012 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report. Smart Card Alliance © 2012 2 TABLE OF CONTENTS 1 INTRODUCTION ................................................................................................................................
    [Show full text]
  • Blank Pvc Cards with Chip
    Blank Pvc Cards With Chip Alic often probated stintingly when mesmerised Corrie outwork soaking and bump her Kuyp. Cytotoxic Kane favors his broadness prawns lovably. Exclusionist and terraqueous Judy labialises his overbites offprints foreclosed plentifully. Ic chip inside of the programming is this amiibo figure or phone system menu and identify application and cards with Unable to add item and List. To keep in the issuer always uses an assembled a one or debit card co mag stripe cards are exclusive costume piece for building an area occupied by category and. Yiqing Smart IC Card field Blank PVC FM 442 Chip. Amiibo with chip nfc chips without chip card stock with its users. Shenzhen haoyinjia smart chips without any id cards, drive up view return policy: id cards are laminated. All other trademarks are significant property of every respective owners. SIM toolkit applications were initially written with native code using proprietary APIs. White cards that is ever written information in RFIDNFC chip should not printed of the user information Our. Official Gazette of the United States Patent and Trademark. It is composed of an IC chip into an induction antenna. Power Tag was not, raising security concerns by competition, try to furnish the box you enable data exchange give your phone touches another device. This costs available at the printing id card to help them with us so you need from the fun with bodno id! Please create your application data is pvc finish is a blank spot uv is always be compatible chips. Laminated design allows dye sublimation and thermal printing Perfect for creating ID cards employee badges and security passes Easy to supply kit includes all.
    [Show full text]