Today's high-tech printing makes ID cards more secure

May 2008 Access Control & Identity Management

From serialisation to micro details to improved durability, cards are tough to copy – and just plain tough!

Security is on everyone's minds these days. Is that driver's licence or ID card an authentic document? Does it have all the security features you have been told to look out for? Does the photo match the person? Does the signature on the sales slip match the one on the card?

In most lines of work, secure identification starts with a photo identification card. Key features are a good photo likeness and a legible signature. Years ago, those features alone were thought to be sufficient, but not today. Issuing authorities now incorporate in photo ID cards a host of additional features to deter counterfeiting, at the same time making authentication easier and more reliable.

The total card protection formula for optimum security

Security comes from a combination of media features, printer capability, database verification, and special security - unusual, covert and forensic features.

Media features include surface quality, durability, and built-in security elements. Printer capability encompasses high-resolution graphics and reliable bar codes plus covert features printed at the time of issue. Database verification consists of a central archive of cardholder data, including a photo, personal statistics, employee number, date, time and place of issue. Special security features are only shared with customers, in order to protect their covert qualities.

Start with strong cards

First and most important, the card itself has to be tough. Gone are the days when ID cards could be printed on garden variety PVC stock with a photo that merely resembled the cardholder. In this security-conscious age, government and other large organisations insist on custom-designed card media of ever increasing sophistication. This is for two main reasons. First, multiple security features create greater counterfeiting difficulties. Second, guards can quickly and easily validate unique features, known only to the organisation's security force.

Your card media should offer an array of security features, any or all of which may be incorporated into custom designs. Today's cards must be extremely durable. For example, your card stock should be 10 times (10x) the flex life of regular PVC cards. It should meet or exceed all international standards for resistance to cracking, permanent adhesion of over-laminate, and durability of image.

The lanyard slot in a regular PVC card is often fragile. If it tears out, an unauthorised user needs only to change the photo to go past a careless inspector. Therefore, choose cards that do not tear easily. Look for unique tear-resistant designs.

To increase durability, higher capability printers feature fully integrated hot roll laminating stations that apply 0,6 or 1,0 mil laminate patch materials, with or without holograms. Cards with laminates will provide up to seven years of wear.

Modern print features are hard to copy

To prevent counterfeiting, alteration or duplication, there are many techniques that companies can employ with digital printers. First of all, they can deploy multiple security images or holograms. One security image alone increases the difficulty of counterfeiting; two makes it at least twice as hard. The holographic image lamination process also provides a very rich-looking card. Multiple screenings of the same photograph increase integrity.

You can also purchase card stock with pre-printed security features, including ultraviolet-visible text and graphics that are available in two colours, green and blue. With micro-printing text can be added to a user's specifications, with deliberate random font changes and misspellings if desired. Character height is five thousandths of an inch (0,125 mm). Pre-printed serial numbers can also be incorporated into card stock. Laser etching is another option.

Fine-line Guilloche patterns with hidden micro-text are aimed at foiling counterfeiters, and micro-printing of text and miniature graphic elements are also difficult to duplicate. An over-laminate film adds security to the printed ID card. The inner surface of the laminate can be pre-printed with OVI ink or UV-visible ink in one, two or three colours. And last, but not least, today's high-tech printers can also laminate with holographic metallisation, including embossed micro-text.

Keeping track of critical information

It is important to keep track of card transactions in the printer's host computer. For example, Zebra's ID/Log records the applicant's personal data, together with other point-of-issue data. This data set can provide a means for security officers to validate the card by comparing a photo ID card with this centrally located data.

Card serialisation adds security. Printers with the magnetic stripe encoder, proximity encoder and smartcard contact options can be set up to function only with serial numbered card stock, and also to add serial numbers to the data recorded by ID/Log.

Security provides peace of mind

By utilising the latest printing technology, your organisation can rest assured it is doing everything it can to prevent identity fraud and to verify that a cardholder is who they say they are. If you are not using the best card printing technology available, you cannot be sure that your cards are secure. And, that is just not acceptable in today's world.

Kathryn Lotado is the director of marketing at Zebra Card Printer Solutions.

For more information contact Zebra, www.zebracard.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...