Access control systems are the go-to security system for any business looking to secure their premises. Security cameras and access control systems make up for a robust security experience that keeps your employees, visitors and property safe. Moreover, access control systems with key fob or card credentials are quite prevalent across the board. The access control card market has a compound annual growth rate (CAGR) of 9% with the total size expected to grow to $103 billion by 2032.
HID global is a leader in access control systems, specifically key fob or card. This blog talks about keycard access control, how it works and how to implement it in your existing system.
Access Control Key Fob or Card
HID offers key fob or card under the name of “Prox” cards. These cards enable access control systems by storing information relevant to the person and the level of access they have across the site. Key fobs work the same way. Key fob or card are the most common type of access control systems that offer a robust security experience.
How An HID Proximity Card Works
HID prox cards contain pre-programmed data that is read by the card reader when it is placed close to it. The data is then transferred to the controller that verifies the user’s information against a set database and allows access if the credentials match.
The internals of the card or fob contain an antenna that determines the strength and range at which the card will be read, and the chip inside the card holds programmed data with user’s credentials. These cards use radio frequency (specifically, 125kHz or 13.56MHz) to communicate with the access controller.
How To Program HID Proximity Key Fob or Card
If you are looking to expand your access control system by getting more cards, or if your users have increased and your system needs to accommodate them, here is the process to follow to easily scale your system:
Determine Your Options And Choices
Before you order key cards, it is a good idea to read up on the information required to do so. This information relates to the facility requirements. The cards you get will depend on the system that you currently have and the cards that go with it.
Format Code
All HID key fob or card come with a format code that basically specifies how the card will communicate with the access control reader and how it is programmed. Finding this can help determine which cards to get. This code is found on the box that the cards are shipped on. Alternatively, you can also look at the box your current cards came in to see the format code.
Pick Your Card’s Programming And Appearance
Once you have correctly identified the format code, next up comes the credential’s appearance as well as the programming. You have the option to choose from a variety of cards with different frequencies, and pick whether you want a programmed card or not.
Programming and Frequency
Based on the requirements, there are three types of configurations that you can go for:
- L & C: Programmed and Low Frequency (125kHz)
- N: Non-Programmed, Low Frequency
Please note that programming your keycard is not the same as linking your card to your system, which is what this blog talks about.
Picking A Card Range And Facility Code
HID asks customers to specify the facility code when placing an order for key cards.
Facility Code:
Usually called a site code as well, the facility code is a numerical value typically assigned to a specific physical location or facility within an organization. It helps the access control system differentiate between cards assigned to different facilities.
Card Range Number:
This is the card’s internal number that is programmed by HID into the card. It is sequential from the number you specify and is unique to each card and does not overlap.
You can decide between pre-selected programming as well as custom programming depending on your need.
Assign Cards To Employees
Once done, you would have the cards ready to be programmed.
You can follow the procedure below to program the card or fob according to your needs:
Connect the Card Programmer: Connect the HID card programmer to your computer using the provided cables or connection method. Ensure the programmer is powered on and recognized by your computer.
Launch Access Control Software: Open the access control software on your computer. This software allows you to manage access credentials, including programming HID keycards and fobs.
Authenticate: Log in to the access control software using the appropriate credentials. You may need administrative privileges to perform card programming tasks.
Access Card Management Interface: Navigate to the section of the software that allows you to manage access cards or credentials. This section may be labeled “Card Management,” “Credential Management,” or something similar.
Add New Card: Choose the option to add a new card or credential to the system. This typically involves specifying the type of card (HID keycard or fob) and assigning a unique identifier to the card.
Assign Access Privileges: Configure the access privileges associated with the card. You can specify which doors or areas the cardholder is allowed to access and any time restrictions that apply.
Program the Card: Follow the prompts in the software to program the HID keycard or fob. This may involve placing the card in the card programmer and initiating the programming process through the software interface.
The card can then be handed to the employee after proper training and briefing on how to use it across the building.
Looking For HID Access Control Systems For Your Business In Canada?
If you are looking to install access control systems for your business, contact Spotter Security today. Spotter Security specializes in access control system installation, programming and maintenance to give you a reliable and secure security experience. With over 20 years of experience in the security industry, Spotter Security knows the security issues that your business faces daily and how to resolve them.
HID proximity cards are fairly prevalent with widespread use across various industries, including corporate offices, retail stores, construction sites, warehouses and more. They provide simple, secure and fast access control management that is also easy to maintain.
Written by : Carlo Di Leo
At the age of 24, with no experience in the security industry or any money in the bank, Carlo quit his job and started Spotter Security from his parent's basement. Founded in 2004, Spotter grew from a single man operation into a multi-million dollar security system integrator that caters to businessess and construction sites across Canada.