Credentials

Credentials

Credentials - who, why, and How to Order

Access Control Credentials – who, why, and how to order.

HID delivers a complete solution of secure smart card IDs and credentials in a variety of form factors for physical and logical access control as well as converged solutions for building and computer access, transit payment, cashless vending, biometrics and other applications.

HID provides the industry’s broadest range of smart card-based credentials such as cards, tags and keyfobs. As part of its portfolio, HID offers non technology IDs as well as single technology, multi technology, and contact chip-based smart cards.

From high-rise offices to hospitals and just about everything in between, building owners seek the security, convenience and efficiency of credentials for access control. With the latest in mobile, smart technology and traditional proximity technology, we have an option for every budget and business need. 

Schlage credentials using MIFARE® DESFire® smart technology are Schlage's highest security credentials. Improve existing systems gradually and economically with multi-technology credentials. Or ditch the card altogether with Schlage Mobile Bluetooth® (BLE) credentials or with Apple wallet based mobile student ID. 

Schlage 13.56 MHz smart cards with MIFARE Classic® and MIFARE® DESFire® technologies utilize encrypted data, providing an extra layer of security. Schlage smart credentials also support a variety of applications beyond access control, such as transit, cashless vending and cafeteria point-of-sale.

AWID Credentials Access Control - Physical access control is a matter of who, where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door.

Identiv’s contact and contactless smart card readers are the international gold standard. As the world leader in smart card reader manufacturing, Identiv’s identity devices and solutions are utilized around the world to enable security and identification, transaction, e-health, and e-government applications. We respond with innovation as technology trends continue to shape the industry — developing high-assurance U.S.-made uTrust FIDO2 Security Keys, iAuthenticate™ and myAuthenticate™ smart card readers for Apple® iOS and Android™ mobile devices, and 125 kHz and 13.56 MHz smart card readers and modules for various desktop and embedded applications. Along with our credentials, wearables, and mobile identity devices, we deliver a suite of highly secure products manufactured in the U.S. or TAA-compliant countries.

Loading...

Call or email us for our pricing on this product.
Phone: (508) 485-1176

View as Grid List

88 Items

Set Descending Direction
per page
© 2023 BSA Security Integrators. All Rights Reserved.