Correctly Connecting ID Badge Systems

Photo ID cards have long been used as a means of identifying individuals. Photographs can be taken with digital cameras, stored on a computer disk and printed on demand. Additionally, the system administrator can alter the look and content of the printed card at will without having to reorder paper stock from a vendor. To see if you get the picture on video badging, take the following quiz.

1. Video badging software must be loaded on the same computer that is used for the access control system.

a. True

b. False

2. A printing technology that uses a multicolor, dye-based ribbon and transfers color with a thermal print head is called:

a. resin transfer.

b. dye sublimation.

c. card lamination.

d. None of the above

3. A printing technology that uses a single-color ribbon and transfers color with a thermal print head is called:

a. resin transfer.

b. dye sublimation.

c. card lamination.

d. None of the above

4. The security of an access card can be increased by using:

a. color images of user.

b. micro-lettering.

c. holographic images.

d. Any of the above

5. Direct-to-card printing card jet printers require special access cards for printing.

a. True

b. False

6. A typical badge design can include the:

a. company logo.

b. employee name.

c. employee picture.

d. department name.

e. All of the above

7. Due to their construction, smart cards cannot be used with video badging systems.

a. True

b. False

8. The badging printer must be connected directly to the work station running the badging software.

a. True

b. False

9. Which of the following is an image file type?

a. bmp

b. jpg

c. tiff

d. All of the above

10. Access control and video badging software cannot be used in a network environment.

a. True

b. False

11. Which of the following is an application programming interface for image process- ing software and scanners or digital cameras?

a. UNIX

b. USB

c. TWAIN

d. None of the above

12. All video badging systems can import any type of image file.

a. True

b. False

13. All video badging systems must print directly on the access card.

a. True

b. False

14. A digital camera can be connected directly to a com- puter by using a USB port.

a. True

b. False

15. Which of the following typi- cally has the largest file size?

a. bmp

b. jpg

c. tiff

d. gif

What’s Wrong with This?

Wally `Larman installed an access control system for a client who had an existing burglar alarm. The client wanted the alarm system to disarm automatically when he arrived in the morning and presented his card to the entry door reader. Wally programmed a momentary output of the access system to follow the entry door release and connected it to a momentary key switch input on the alarm system, as shown in the accompanying diagram. However, when he tested the system, it did not work as intended. Can you see what Wally did wrong and what he must do to correct the problem?

Answers

1. b – Video badging can be loaded on the same computer or another computer. It is not even necessary to have an access system to use a video badging system. If an access system is installed, the most efficient method is to use a common database for the access and video badging. This eliminates entry of duplicate information.

2. b

3. a

4. d – Each of these tactics can increase the security of printed cards, because they make copying the card difficult.

5. a – Most printers that print directly on a card require a card that is designed to accept the type of printing being used.

6. e – Any or all of these can be included in a badging system. The system administrator can change the layout of the card as needed.

7. b

8. b – Many badging systems are network-capable and allow the printer to be connected anywhere on the LAN.

9. d

10. b – Although some systems are designed to work on a stand-alone computer, many systems are network-capable.

11. c

12. b – You should check with the manufacturer to determine which type of image files can be imported into your badging software.

13. b

14. a

15. c

Answer to: What’s Wrong with This?

With the way Wally connected the alarm and access system, when the owner first uses his card, the alarm system will disarm, but the next time a card is used, the alarm system will arm. This is because he connected the access output directly to the key switch input of the alarm control. Wally should program an output of the alarm system to follow the arm/disarm status of the alarm system. Then he should use this output to prevent the access control from activating the key switch input zone when the alarm is off, as shown in this diagram. In this way, when the alarm is off, the access output is disconnected from the key switch input, but when the alarm is armed, it is reconnected automatically. As an alternative, Wally may have been able to use the burglar alarm control for the access system. The power of today’s controls allows many to support access as well as traditional burglar and fire alarm devices. If this were possible, Wally would have been able to simply program the system to disarm when a valid credential was presented to the entry reader.