U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Choosing the Right Card

NCJ Number
101813
Journal
Security World Volume: 23 Issue: 6 Dated: (June 1986) Pages: 42-47
Author(s)
D M Bowers
Date Published
1986
Length
6 pages
Annotation
Access card encoding methods discussed include early, simple methods, embedded materials, magnetic techniques, proximity card coding, and emerging techniques.
Abstract
Early methods, including optical bar-codes and Hollerith punches, are clearly visible, recognizable, decodable, and can be duplicated by anyone having basic technical knowledge. Embedded materials, both magnetic and nonmagnetic, are another step in access cards, but analytical equipment can detect and crack the code. Proximity cards relay codes through electromagnetic, optical, or ultrasonic transmissions. Performance characteristics of these systems vary widely, and no single choice is best for all applications. The future of access control lies in intelligent portable devices rather than in passive embedded-code cards. An emerging technology is the laser card, which can store 4 million data characters in addition to having a magnetic stripe. The combination of laser storage and embedded microchips offers the possibility of a multipurpose computer system that can be carried in the wallet and plugged into computer terminals for access control and other purposes. Since any card access code can be defeated by determined and knowledgeable persons, the value of a card access system depends on the total security system within which it is applied. 5 exhibits.

Downloads

No download available

Availability