Today's high-tech printing makes ID cards more secure

Access & Identity Management Handbook 2007 Access Control & Identity Management

From serialisation to micro details to improved durability, cards are tough to copy – and just plain tough!

Security is on everyone's minds these days. Is that driver's licence or ID card an authentic document? Does it have all the security features you have been told to look out for? Does the photo match the person? Does the signature on the sales slip match the one on the card?

In most lines of work, secure identification starts with a photo identification card. Key features are a good photo likeness and a legible signature. Issuing authorities now incorporate in photo ID cards a host of additional features to deter counterfeiting, at the same time making authentication easier and more reliable.

The total card protection formula for optimum security

Security comes from a combination of media features, printer capability, database verification, and special security - unusual, covert and forensic features.

Media features include surface quality, durability, and built-in security elements. Printer capability encompasses high-resolution graphics and reliable bar codes plus covert features printed at the time of issue. Database verification consists of a central archive of cardholder data, including a photo, personal statistics, employee number, date, time and place of issue. Special security features are only shared with customers, in order to protect their covert qualities.

tart with strong cards

First and most important, the card itself has to be tough. In this security-conscious age, government and other large organisations insist on custom-designed card media of ever increasing sophistication. This is for two main reasons. First, multiple security features create greater counterfeiting difficulties. Second, guards can quickly and easily validate unique features, known only to the organisation's security force.

Your card media should offer an array of security features, any or all of which may be incorporated into custom designs. Today's cards must be extremely durable. For example, your card stock should be 10 times (10x) the flex life of regular PVC cards. It should meet or exceed all international standards for resistance to cracking, permanent adhesion of over-laminate, and durability of image.

To increase durability, higher capability printers feature fully integrated hot roll laminating stations that apply 0,6 or 1,0 mm laminate patch materials, with or without holograms. Cards with laminates will provide up to seven years of wear. Such lamination is especially recommended for abrasion intensive applications such as frequent bar code or magnetic stripe reading. Depending on volume and how quickly one needs to print cards, there are printers that laminate one side at a time or both sides at once.

Modern print features are hard to copy

To prevent counterfeiting, alteration or duplication, there are many techniques that companies can employ with digital printers. First of all, they can deploy multiple security images or holograms. One security image alone increases the difficulty of counterfeiting; two makes it at least twice as hard. The holographic image lamination process also provides a very rich-looking card. Multiple screenings of the same photograph increase integrity. This is almost the norm on driver's licences. Unique graphic identifiers, such as allowing only the red-bordered cardholders to access an area, help differentiate security levels.

You can also purchase card stock with pre-printed security features, including ultraviolet-visible text and graphics that are available in two colours, green and blue. With micro-printing text can be added to a user's specifications, with deliberate random font changes and misspellings if desired. Character height is 5 thousandths of an inch (0,125 mm). Pre-printed serial numbers can also be incorporated into card stock. Laser etching is another option.

Fine-line Guilloche patterns with hidden micro-text are aimed at foiling counterfeiters, and micro-printing of text and miniature graphic elements are also difficult to duplicate. An over-laminate film adds security to the printed ID card. The inner surface of the laminate can be pre-printed with OVI ink or UV-visible ink in one, two or three colours. And last, but not least, today's high-tech printers can also laminate with holographic metallisation, including embossed micro-text.

Keeping track of critical information

It is important to keep track of card transactions in the printer's host computer. For example, Zebra's ID/Log records the applicant's personal data, together with other point-of-issue data. This data set can provide a means for security officers to validate the card by comparing a photo ID card with this centrally located data.

Card serialisation adds security. Printers with the magnetic stripe encoder, proximity encoder and smartcard contact options can be set up to function only with serial numbered card stock, and also to add serial numbers to the data recorded by ID/Log.

Here is how card serialisation works. All cards supplied to an organisation using this system are pre-printed on the front or back with a serial number, which is also recorded on the card's credential medium, such as magnetic stripe, proximity chip or smartcard IC. The ID card printer is configured to accept only serial numbered cards, and will eject, without printing, any card without the appropriate encoding. If a valid serial number is detected, the card is printed in the usual way.

The serial number read from the credential medium is recorded in the printer's host computer, where it is linked with the licence or employee number and other data such as date, time, and location. This data set is available for uploading at any time to the organisation's central database.

As a result, the security officer can read, on-the-spot, an ID card that is linked in the database to a serial number without any special equipment. When transmitted to the central database, the serial number can, in turn, trigger a download to a local terminal. Now, in addition to the usual comparison of photo and subject, it is easy to check, instantly, the correlation of serial number and credentials.

Kathryn Lotado is the director of marketing at Zebra Card Printer Solutions.

For more information contact Zebra, www.zebracard.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.