Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

IDing Printers

By Bill Zalud
February 24, 2003
Card printers, the real workhorses of security identification systems, have entered a new level in their evolution.

Driven by user demands, expanding card technologies and specific applications that go beyond typical security needs, card printers are faster, smarter and easier to operate and maintain with a smaller footprint — often at per unit prices far below just a couple of years ago.

Take the Six Flags Over Texas amusement park in Arlington, Tex., as one example.

“When a person decides to purchase a season pass at Six Flags, she wants her pass now so that she can use it that day,” emphasizes Julie Ann Keith, IT manager for the park. “Our visitors like the quick turnaround we provide by printing our season passes on demand. They can immediately start taking advantage of the discounts at our retail stands.

“Likewise, printing on premises is good for us, too,” Keith adds. “Sending cards out to be printed is not cost-effective, efficient or convenient. I am impressed with the speed in which we print cards. Versus our former printing system, the Eltron system is less expensive, consumables cost less and it is easier to maintain with less downtime.” Six Flags Over Texas uses up to nine Eltron P310 printers at two processing centers in the Park.

“We are particularly impressed with the cost and small footprint of the P310,” reports Keith.

Reliability also is an important ID printer factor. Take Southern California’s Cypress College, for instance.

Once a student registers at the North Orange County Community College District’s Cypress College, his or her student card is ready one minute later. From that point on, students use that ID card as identification on campus — for use at the student bookstore, to enter laboratories and even to check out books at the library.

“Our previous card printer broke down constantly, about every dozen cards,” remembers Sara Hogg. “We wanted speed plus card clarity from a printer and found it last year in our Zebra Eltron P310. ” The standard plastic cards issued by Cypress College feature a photo ID and barcode at the bottom. The barcode comes into play at laboratories and the library. As the student approaches a lab, a technician, professor or advisor asks the student to present their card and have it scanned by a barcode reader. Upon verification that the cardholder is authorized for the facility, the student can enter the lab.

Multi-use IDs also are hot. That’s apparent in a partnership that IDenticard and Debitek. They just formed an alliance to make IDenticard’s access control and imaging systems compatible with Debitek’s electronic cash systems for corporate and university campuses. Among Debitek’s offerings is the MoneyClip solution — an electronic cash system for use on campuses and cafeterias that replaces currency with stored value cards in vending machines, copiers, pay-for-print areas and dining-area cash registers.

Innovations in card printers routinely target college applications. Fargo Electronics Inc., for example, recently introduced the Professional Series CardJet 410 Printer/Encoder, a plastic card personalization system. The printer is competitive with old-fashioned “cut and paste” analog photo-based ID badge systems.

Two-dimensional Printing

Innovative card-based technology that fits between mag stripe, barcode and smart cards also determines printer needs. Datastrip, for instance, uses its 2D bar code technology to create a new breed of ID cards designed to help prevent abductions at schools. These new “safe student” ID cards include small barcodes encoded with the names and photographs of students as well as adults who are authorized to pick them up, plus emergency numbers and medical data. School personnel use a portable barcode reader to decode the information and match it against adults who come to claim children during or after school.

The ID cards will be decoded with Datastrip’s DSVerify2D barcode reader, the handheld device that can decode and display photographs as well as text and fingerprints. This will enable school personnel to swipe the ID cards and perform identification duties outside the building as parents pull up in their cars, eliminating the need to park and come inside.

“Divorce custody battles, stranger abductions and terrorist concerns have created a growing security problem for many schools, and administrators are searching for strategies to help foil kidnapping attempts,” says Chuck Lynch of Datastrip. “With the ability of our technology to validate individual identities, these safe student ID cards are a new weapon in the struggle to keep our children out of harm’s way.”

In other card printer news:

Fargo’s HDP820 high-definition printing card printer/encoder is a desktop system that allows end users to decentralize the issuance of smart cards while choosing from a broad array of options for encoding electronics necessary to personalize and activate the cards.

Datacard Group now has inline proximity card reading capabilities for its Select and Magna Platinum Series desktop card printers. This allows the printers to read facility cards and identification numbers stored in proximity cards while photos, text and other identity elements are being printed on the cards. A plug-in for Datacard ID works as identity software then allows that information to be stored in a central identity database, along with photos and demographic data.

Maxell Corp. of America has a unique coil-on-chip card protected by a layer of plastic coating. The firm’s smart cash card stores cash in a digital format for use in vending machines, copy machines, FAX machines, laundry machines and other access points of sale. The chip memory is larger than the data storage on a typical magnetic stripe card, thanks to the integrated circuit chip.

Users wanting to increase their use and security of badges sometimes don’t even need a card printer. For instance, TEMTEC has a ONEstep TEMPbadge visitor badging system based on the firm’s self-expiring badge, which changes color automatically. It goes from white to red to quickly identify an expired badge and deflect re-use.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Smartphone used for security

    Another Evolution?

    See More
  • Guy Grace

    Retrofit Fits the Bill for Outdated Security Technology

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing