Today's high-tech printing makes ID cards more secure

May 2008 Access Control & Identity Management

From serialisation to micro details to improved durability, cards are tough to copy – and just plain tough!

Security is on everyone's minds these days. Is that driver's licence or ID card an authentic document? Does it have all the security features you have been told to look out for? Does the photo match the person? Does the signature on the sales slip match the one on the card?

In most lines of work, secure identification starts with a photo identification card. Key features are a good photo likeness and a legible signature. Years ago, those features alone were thought to be sufficient, but not today. Issuing authorities now incorporate in photo ID cards a host of additional features to deter counterfeiting, at the same time making authentication easier and more reliable.

The total card protection formula for optimum security

Security comes from a combination of media features, printer capability, database verification, and special security - unusual, covert and forensic features.

Media features include surface quality, durability, and built-in security elements. Printer capability encompasses high-resolution graphics and reliable bar codes plus covert features printed at the time of issue. Database verification consists of a central archive of cardholder data, including a photo, personal statistics, employee number, date, time and place of issue. Special security features are only shared with customers, in order to protect their covert qualities.

Start with strong cards

First and most important, the card itself has to be tough. Gone are the days when ID cards could be printed on garden variety PVC stock with a photo that merely resembled the cardholder. In this security-conscious age, government and other large organisations insist on custom-designed card media of ever increasing sophistication. This is for two main reasons. First, multiple security features create greater counterfeiting difficulties. Second, guards can quickly and easily validate unique features, known only to the organisation's security force.

Your card media should offer an array of security features, any or all of which may be incorporated into custom designs. Today's cards must be extremely durable. For example, your card stock should be 10 times (10x) the flex life of regular PVC cards. It should meet or exceed all international standards for resistance to cracking, permanent adhesion of over-laminate, and durability of image.

The lanyard slot in a regular PVC card is often fragile. If it tears out, an unauthorised user needs only to change the photo to go past a careless inspector. Therefore, choose cards that do not tear easily. Look for unique tear-resistant designs.

To increase durability, higher capability printers feature fully integrated hot roll laminating stations that apply 0,6 or 1,0 mil laminate patch materials, with or without holograms. Cards with laminates will provide up to seven years of wear.

Modern print features are hard to copy

To prevent counterfeiting, alteration or duplication, there are many techniques that companies can employ with digital printers. First of all, they can deploy multiple security images or holograms. One security image alone increases the difficulty of counterfeiting; two makes it at least twice as hard. The holographic image lamination process also provides a very rich-looking card. Multiple screenings of the same photograph increase integrity.

You can also purchase card stock with pre-printed security features, including ultraviolet-visible text and graphics that are available in two colours, green and blue. With micro-printing text can be added to a user's specifications, with deliberate random font changes and misspellings if desired. Character height is five thousandths of an inch (0,125 mm). Pre-printed serial numbers can also be incorporated into card stock. Laser etching is another option.

Fine-line Guilloche patterns with hidden micro-text are aimed at foiling counterfeiters, and micro-printing of text and miniature graphic elements are also difficult to duplicate. An over-laminate film adds security to the printed ID card. The inner surface of the laminate can be pre-printed with OVI ink or UV-visible ink in one, two or three colours. And last, but not least, today's high-tech printers can also laminate with holographic metallisation, including embossed micro-text.

Keeping track of critical information

It is important to keep track of card transactions in the printer's host computer. For example, Zebra's ID/Log records the applicant's personal data, together with other point-of-issue data. This data set can provide a means for security officers to validate the card by comparing a photo ID card with this centrally located data.

Card serialisation adds security. Printers with the magnetic stripe encoder, proximity encoder and smartcard contact options can be set up to function only with serial numbered card stock, and also to add serial numbers to the data recorded by ID/Log.

Security provides peace of mind

By utilising the latest printing technology, your organisation can rest assured it is doing everything it can to prevent identity fraud and to verify that a cardholder is who they say they are. If you are not using the best card printing technology available, you cannot be sure that your cards are secure. And, that is just not acceptable in today's world.

Kathryn Lotado is the director of marketing at Zebra Card Printer Solutions.

For more information contact Zebra, www.zebracard.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bespoke access for prime office space
Paxton Access Control & Identity Management
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...