Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ID Tech Goes Mobile

By Bill Zalud
December 15, 2003
Emerging and nontraditional identification technologies now play a larger and more important role identifying people, vehicles and assets as well as protecting perimeters ranging from parking lot entrances to borders.

Some of the solutions combine a diversity of ID technologies, including biometrics; others depend on video, sound or radio frequency identification (RFID).

A Nicaraguan resort, for instance, uses two-dimensional barcode to increase its security. Datastrip of Exton, Pa., working with San Andres Island, a Colombia resort area located off the coast of Nicaragua, employs Datastrip’s 2D Superscript barcode symbology encrypt identity information on new resident ID cards that will be issued over the next 18 months.

Multi-technologies

Each barcode stores encrypted versions of the cardholder’s fingerprint template, color photograph, first and last name, gender and Colombia national ID number in an area the size of a magnetic stripe. The Datastrip symbology holds twice the data of other 2D barcodes in one-third the footprint and cannot be altered without disabling the encoded information, ensuring that no one can successfully impersonate the legitimate cardholder.

“San Andres officials wanted to reissue existing resident ID cards with secure features to stop forgeries and other ID fraud by the many people who come to the island and don’t want to leave,” Jaime Gabay, project manager with Grupo Insular, a Colombia-based joint venture, says.

“The local government did not have the budget to store identity information on smart chips, but Datastrip’s barcode offered a less costly and equally secure alternative with the simple deployment required to fit the island’s limited technical resources.”

Decoding will include two different Datastrip readers. The PCRead2D, a stationary PC-based card scanner roughly the size of a pocket calculator, will check resident IDs at the airport and the main San Andres dock. The DSVerify2D, a portable reader capable of decoding fingerprints, text and photographs in one swipe, will control access on cruise ships, private yachts, fishing boats and government and military planes where connection to a personal computer is not possible. In addition to displaying decoded photographs and text on the built-in LCD, the DSVerify2D has an optical fingerprint scanner to match the cardholder’s live fingerprint with a biometrics-based template.

“You can print two-dimensional barcode on most any type of document or identification card,” Chuck Lynch, Datastrip vice president of sales and marketing, says. With the barcode, “you can store mass amounts of information, a photo, biometrics as well as text and digital signature.”

Use of the 2-D document is a secure tie to the person. “And the template is created at no additional cost. It can be produced by a standard card printer at 300 dpi,” adds Lynch. “It is inexpensive compared to smart cards.”

There are others ways to achieve secure mobility.

For example, AWID of Monsey, N.Y., with its radio frequency identification technology, emphasizes low cost readers and digital antennas.

AWID is currently expanding its handheld and fixed location tag reader products and is adding a new line of lower cost, higher performance digital antennas connected by a simple twisted pair of wires, like a telephone, instead of conventional coax cables. Read range is nine feet to 11 feet when tags are attached by self-adhesive to the inside of the vehicle’s windshield.

Attraction of Long Range

Just last month, AWID released a new Prox-Linc MT, a passive tag for its LR-911 long range reader. The MT tag is a truly passive tag, meaning that it contains no battery, and can be read by the LR-911 reader from a distance of nine to 11 feet. The design of the MT tag makes it suitable for vehicle license plate frame mounting, securing to heavy equipment using screws or any other type of mounting on either metallic or non-metallic surfaces. In early fall, AWID said it had already shipped over 10,000 MT tags. The new MT tag will accommodate industry standard Wiegand data formats from 26 to 1,000 bits.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • As Consumer Electronics Go, So Goes Security Tech

    See More
  • Beit Yaakov Movement School in LA Goes High Tech

    See More
  • Mobile Wireless Network Goes Citywide

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing