User Manual

Understanding Wireless Identification 8
HID Corp.
proximity cards, giving the PC the ability to detect when the user
has left the area with their card. Once removed, the PC is
automatically locked. When the user returns, the authenticating
information is exchanged between the pcProx Base Unit attached
to the PC and the proximity ID card. The result is a complete lock
and reactivation of access to the PC!
Why is it necessary?
With the proliferation of PC’s, cash machines, security systems,
and electronic locks, users are increasingly burdened with the
requirement of entering passwords and PINs (person identification
numbers) to gain access to these protected systems. The AIR ID
system (pcProx reader and AIR ID software) eliminates the burden
without compromising privacy or security.
Who can benefit using the System?
AIR ID is necessary for PC users who have access to sensitive
files or those who simply want the convenience of automatic login
and walk-away security. Employees using Win95/98/NT operating
systems will benefit with AIR ID. It eliminates the problems of
manual interaction-based security, increases efficiency,
compliance, and may also prevent security breaches.
Below are some examples of environments that will find AIR ID
useful:
Medical - Hospitals and medical centers where nurses, doctors,
and administrative personnel need quick and secure access to
patient records without the burden of constant login and logout
functions.
Financial - Trading floors, banks, insurance companies and other
financial institutions working with sensitive information, and
performing financial transactions, that should not be viewed by
unauthorized users. These users also benefit from AIR ID’s audit
log.
Corporate - HR, MIS, payroll, tax departments, company
executives, secretaries, sales personnel, etc. Departments
responsible for their own company sensitive data who are
concerned of inadvertently releasing information to other company
employees through unattended logged in systems. By using AIR
ID the user can comply without extra effort.
Government - Employees and government contractors who have
confidential information that should be secured at both their
desktops as well as at the network level. These Government