{"id":1051,"date":"2014-07-31T11:12:42","date_gmt":"2014-07-31T16:12:42","guid":{"rendered":"http:\/\/www.soslocksmith.com\/blog\/?p=1051"},"modified":"2014-07-31T11:14:06","modified_gmt":"2014-07-31T16:14:06","slug":"card-access-technology-works","status":"publish","type":"post","link":"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/","title":{"rendered":"How Card Access Technology Works"},"content":{"rendered":"<p><a href=\"http:\/\/www.soslocksmith.com\/blog\/wp-content\/uploads\/2014\/07\/Card-Access-NYC.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone  wp-image-1052\" alt=\"Card Access NYC\" src=\"http:\/\/www.soslocksmith.com\/blog\/wp-content\/uploads\/2014\/07\/Card-Access-NYC.jpg\" width=\"804\" height=\"566\" srcset=\"https:\/\/www.soslocksmith.com\/blog\/wp-content\/uploads\/2014\/07\/Card-Access-NYC.jpg 1005w, https:\/\/www.soslocksmith.com\/blog\/wp-content\/uploads\/2014\/07\/Card-Access-NYC-300x211.jpg 300w\" sizes=\"(max-width: 804px) 100vw, 804px\" \/><\/a><\/p>\n<p>Security is a highly valued priority in our society, especially on a national scale. On a personal level, security is pertinent against attacks and crimes such as identity theft and fraud. Access to sensitive information is limited in order to protect the livelihood of individuals and organizations. <a title=\"Card Acess System NYC\" href=\"http:\/\/www.soslocksmith.com\/access-control\/card-access\/\">Access cards<\/a> are an increasingly common way to keep unauthorized individuals from certain locations and information. Below we will discuss how card Access Technology Works.<\/p>\n<h2>The Physical Aspects<\/h2>\n<p>A security access card is more than just an identification card. There have to be certain countermeasures placed on the card in physical form, so people can distinguish a legitimate card from a false one. For example, numerical codes and watermarks are used by government companies as countermeasures that are hard to reproduce. Other companies will have a variation in the background colors and even add a replica of the cardholder&#8217;s fingerprint to the security card as a form of distinguishing physical mark.<\/p>\n<h2>Internal Controls<\/h2>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/lK0aFpwFRv4?list=UUALKUcUOUnoOmWJzextDeYw\" height=\"315\" width=\"560\" allowfullscreen=\"\" frameborder=\"0\"><\/iframe><\/p>\n<p>Beyond physical markings, security access cards have more measures of protection. At the basic level, access cards tend to have magnetic strips that pass through card readers that give people approval or denial to signify access. However, one of the big problems with magnetic strips is that they can easily be de-magnified. Although the information cannot be taken off the card and reproduced, loss of the information can hinder or limit a person&#8217;s access. With use of the magnetic stripe there are card readers that can understand the information on the stripe. There are several methods for reading the magnetic stripe on an access card, with the most common three being: swipe reader, insert reader, and proximity reader.<\/p>\n<h2><a title=\"Advanced Security NYC\" href=\"http:\/\/www.soslocksmith.com\/advanced-security-services\/\">Advanced Security<\/a><\/h2>\n<p>At more deeper levels, you can come across microchips embedded into cards that contain special information for identification. This is mostly effective when it comes to accessing computer systems. The information on them must be completely matched with another computer&#8217;s information through a special reader, or else the person will be denied access to the system. That information can change many times on regular or irregular intervals, which makes it harder for criminals to reproduce it.<\/p>\n<h2>Methods of Access<\/h2>\n<p>Most general security access cards use a magnetic stripe but some use a different method for access. For example, one alternative that is used is the embedding of a tiny radio transmitted in the card. These security access cards can be either &#8220;active&#8221; (possessing a small battery) or &#8220;passive&#8221; (having a reliance on the radio receiver for power). When the card is taken within a certain distance of the radio receiver, usually just a few feet or even down to a few inches, the security system can confirm the signal being transmitted and provide access to the area or building of interest.<\/p>\n<h2>Card Access System In NYC<\/h2>\n<p>SOS Locksmith NYC and Advanced Security System carries a variety of card access system and FOB brands included Keri, Keyscan, ZIC Technology, Linear, and Doorking.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - http:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"http:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"google\",\"pinterest\");var hupso_counters_lang = \"en_US\";var hupso_image_folder_url = \"\";var hupso_title_c=\"How Card Access Technology Works \";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div><div id=\"social-essentials\" class=\"se_left\"><div class=\"se_button se_button_small\" style=\"width:72px;margin:0px 0px 0px 0px\"><iframe src=\"\/\/www.facebook.com\/plugins\/like.php?locale=en_US&href=https%3A%2F%2Fwww.soslocksmith.com%2Fblog%2Fcard-access-technology-works%2F&amp;send=false&amp;layout=button_count&amp;show_faces=false&amp;action=like&amp;colorscheme=light&amp;font\" scrolling=\"no\" frameborder=\"0\" allowTransparency=\"true\"><\/iframe><\/div><div class=\"se_button se_button_small\" style=\"width:85px;margin:0px 0px 0px 0px\"><a href=\"https:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/\" data-text=\"How Card Access Technology Works\" data-via=\"SOSLocksmithNYC\" data-counturl=\"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/\" data-count=\"horizontal\" data-lang=\"en\">Tweet<\/a><\/div><div class=\"se_button se_button_small\" style=\"margin:0px 0px 0px 0px\"><a name=\"fb_share\" type=\"button_count\" share_url=\"https%3A%2F%2Fwww.soslocksmith.com%2Fblog%2Fcard-access-technology-works%2F\">Share<\/a><\/div><div class=\"se_button se_button_small\" style=\"width:60px;margin:0px 0px 0px 0px\"><g:plusone size=\"medium\" href=\"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/\" count=\"true\"><\/g:plusone><\/div><div class=\"se_button se_button_small\" style=\"width:65px;margin:0px 0px 0px 0px\"><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fwww.soslocksmith.com%2Fblog%2Fcard-access-technology-works%2F&media=&description=How+Card+Access+Technology+Works\" class=\"se-pin-it-button\" always-show-count=\"true\" count-layout=\"horizontal\"><img border=\"0\" src=\"\/\/assets.pinterest.com\/images\/PinExt.png\" title=\"Pin It\" \/><\/a><\/div><div class=\"se_button se_button_small\" style=\"margin:0px 0px 0px 0px\"><su:badge layout=\"1\" location=\"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/\"><\/su:badge><\/div><\/div><div class=\"clear\"><\/div><style type=\"text\/css\">#call_to_action h4{padding:0px 5px;}<\/style>","protected":false},"excerpt":{"rendered":"<p>Security is a highly valued priority in our society, especially on a national scale. On a personal level, security is pertinent against attacks and crimes such as identity theft and fraud. Access to sensitive information is limited in order to &hellip; <a href=\"https:\/\/www.soslocksmith.com\/blog\/card-access-technology-works\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,11],"tags":[610,268,371,372,370,373,376,374,375,378,184,377],"_links":{"self":[{"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/posts\/1051"}],"collection":[{"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/comments?post=1051"}],"version-history":[{"count":4,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/posts\/1051\/revisions"}],"predecessor-version":[{"id":1056,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/posts\/1051\/revisions\/1056"}],"wp:attachment":[{"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/media?parent=1051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/categories?post=1051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.soslocksmith.com\/blog\/wp-json\/wp\/v2\/tags?post=1051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}