• Secure corporate cards: Efficient and safe solutions

Efficient and safe solutions

Secure corporate cards

In an era in which digitization is progressing, there are still outdated, not safe corporate cards that still have to be programmed individually on each door. Not to forget the numerous keys that are floating around everywhere. But that doesn’t have to be the case, because the use of multifunctional, RFID-based corporate cards represents an efficient and secure solution for various security applications in the company.

It is not uncommon for different access control systems to be established in companies over time, with the help of which access to a site, a building and on different floors. This grown structure often extends across several locations, with different systems and technologies use in different locations. In extreme cases, this means that employees need several ID cards, tokens or key cards to gain access. The administrative effort for the reliable monitoring and control of authorizations and the management of corporate cards is also also complicated. Technologies that are gradually declared to be abandoned are also used because they are outdated and unsafe.

The integration of encrypted RFID technology in access media represents a transformative change in the administration and safety of operating processes.

The way to a safe access medium

First of all, it is recommended to carry out a comprehensive inventory of the existing techniques and facilities that can be relevant for the use of a company ID. The goal is to integrate the existing resources into the planning of a new access medium so that additional costs are minimized by the purchase of new systems.

An optimal procedure also includes evaluation and, if necessary, the introduction of modern access control systems that enable central authorization management. This includes the identification of all access points, the analysis of the existing safety infrastructure and the implementation of a system that is tailored to the specific needs and requirements including comprehensive authorization management.

A clear definition of the purpose of the new access medium is essential. It must be determined whether it is only used for access control or for multifunctional purposes, as this is decisive for the technical design and storage capacity.

For a safe access medium, it must be clarified which characteristics it should be protected against illegal copying and abuse. On the one hand, this affects the optical design when it is a check card format that also acts as an access medium (optical design) and the associated features such as the use of holograms/duograms, micro font or QR codes.

The selection of the RFID chip technology and the corresponding encryption methods is central to the safety and functionality of the new access medium. Modern RFIDCHIPS such as Mifare Desfire®, Legic, HID as well as technologies such as QR barcode, NFC and BLE enable wireless identification of objects via distances and the exchange of data between the RFID tag and a reader (note of the editor can be used and not only the serial number is read out, which is unfortunately too often the case). This technology ensures the integrity and protection of the data due to the progressive encryption technology, which can only be decrypted by authorized reader. The choice of encryption method should be made based on the specific safety requirements, the implementation complexity and interoperability with existing systems in order to ensure optimal safety and functionality.

If these framework conditions are in place, the careful planning and coordination of technical integration can be done. This includes in particular the clarification of the coding and encryption techniques that are to be used. This must always be done in cooperation with the providers and partners of the integrated applications in order to also define the interfaces.


  1. Where does the system move the master data from or which system forms the basis of the multifunctional access system?
  2. How is the connection to the “main system” (communication/interface)?
  3. Which system should assign an individual number (UID) to the ID? How many numbers can they have?
  4. Does there have to be a 2-factor authentication in any place?
  5. Where, for example, the identification takes place during private printing?
  6. Should data only be read out and checked or backed to the card?
  7. For payment systems, it should be clarified where the money comes from (charging, payroll, private account)?

By integrating experience and predictive planning, it can be ensured that the systems meet not only the current but also future requirements.

Well thought-out technical integration laid the foundation for a safer, more efficient and future-proof access and identification management.

The implementation of test runs with trial cards or test keys is a crucial step to reduce possible future modifications to a minimum. This means that test cards are created that are designed specifically for the.

For those who prepare a tender, a two -stage procedure is recommended: First, the specifications of the cards should be disclosed, followed by providing a test keys or a specially prepared test card for the actual test with a written confirmation of functionality.

An essential step in this procedure is to obtain a written release for the test cards. This ensures that all parties involved – both the provider of security technology and the useful company – achieve an agreement on the functionality and safety requirements of the test ID. This approach not only serves to avoid later cost -intensive adjustments, but also ensures that the finally implemented ID solutions can be optimally integrated into the existing system landscapes and fully meet the requirements of the company.

The preparation of the ID cards and, if necessary, the pressure of the design can be carried out by the manufacturer, but also offer the option of self -production. This decision depends on various factors, such as internal resources, the desired flexibility, costs as well as the data protection and security requirements of the company.

If the pre-coding and the printing is carried out externally by the manufacturer, this can offer advantages with regard to the professionalism and quality of the end product, since the manufacturer has specialized know-how and the corresponding technical equipment and can accompany the process of technical integration. The decision to carry out the pre -coding and pressure on the internal implementation offers higher control and flexibility. However, this requires the necessary technical equipment and specialist knowledge as well as good management of the associated processes.

In any case, it is important that the selected method meets the safety, quality and efficiency requirements of the company and enables seamless integration into the existing systems.

First of all, it is essential to define all processes relating to the authorizations, the issue and return of IDs, dealing with loss and replacement procurement as well as the management and custody of the IDS. The determination of these processes must ensure compliance with the applicable laws and regulations in the areas of security and data protection. In addition, coordination with organizational units such as the works council is essential in order to meet the requirements of everyone involved.

Before the introduction of new access media, there should also be internal test runs and surveys before the “big rollout” begins to recognize problems or to eliminate in advance

In summary, RFID technology offers efficient, safe and user-friendly solution for use in corporate cards (access media). It enables companies to strengthen their security protocols, optimize operating processes and create a flexible environment that is geared towards the future.

Only with the active integration of the workforce in dealing with the new IDs and their benefits can they promote motivation.

This article is with the kind support of Dipl.-Kfm. Thomas Ehm, Senior Key Account Manager from Evolutionid GmbH, was created, a company that specializes in RFID technology migration, access media and its production and offers software solutions for the central management of identities.

SICHERHEIT - Fachmagazin

An article from the specialist magazine Security – Issue 26
This article is with the kind support of Dipl.-Kfm. Thomas Ehm, Senior Key Account Manager from Evolutionid GmbH.

Application examples for a multifunctional access medium:

In addition to access control, a multifunctional access medium, for example, also for time recording, for lockers, packages/mailboxes, electric charging stations, payments in the canteen or cafeteria, for a secure document printing, for controlling machines and systems, registration in the Working environment, a digital signature, a digital business card, for driving license control or for the output of materials and tools.

RFID technology offers a wide range of advantages that go far beyond the basic function of access control:

Fast and contactless identification:
RFID enables rapid contactless detection that significantly accelerates access to buildings and space, but also other applications. There is no need for physical contact or manual.

Increased security through encryption:
RFID ID cards can be equipped with complex encryption mechanisms and authentication functions. This not only makes falsification or unauthorized reproduction of the ID cards significantly, but also protects the sensitive personal data stored on it from abuse.

Multifunctionality and flexibility:
Due to the ability to store a variety of data on the RFID chip, the ID cards for multifunctional tools for a wide range of applications become.

Real-time monitoring:
The possibility of grasping in real time, who is in the building where, can be crucial in emergency situations.

RFID systems can be easily expanded and changing needs. Integration of additional reading devices or the expansion of the system by new areas of application is possible without much effort.

Safe corporate cards summarized:

1.Access media without current or without any encryption mount high security risks.

2. Different systems and applications increase the administrative effort and the susceptibility to errors, which creates security risks.

3. The costs: to minimize these security risks and ensure reliable control over the access permits, a strategic approach is required.

Corporate ID = also called access medium, because ultimately the company ID with which I can get access is an access medium. The shape can be a check card, a token, keyfobs, a bracelet, a smartphone etc.

About evolutionID:

For more than 20 years, evolutionID has been providing its customers with manufacturer-independent consulting services and designing custom-fit solutions on the topics of RFID, digital identity, Identity-Management and Industry 4.0. The established company based in Munich specializes in specific solutions for medium-sized and large customers in industry and public authorities and has even developed its own browser-based identity management system, IDfunction. With seamless process chains for efficient, AI-supported ID card creation and management, evolutionID creates more transparency, increases the level of security and lowers costs. As a full-service provider, evolutionID takes on projects from analysis to consulting and conception through to complete, ready-to-use solutions.

Release Notes for IDfunction Web 2.1.0