Identification card manufacturing security

ABSTRACT

Identification card manufacturing security restricts use of an identification card manufacturing system with only authorized supplies. In accordance with one aspect of the invention, a supply-specific security code (SSSC) and supply-specific data are stored in memory of the supply. The SSSC is translated using the supply-specific data. Finally, the supply is authorized for use with the identification card manufacturing system only when the translated SSSC is found to be valid. In accordance with another aspect of the invention, an identification card manufacturing system is configured to operate only with supplies having corresponding customer-specific security codes (CSSC). A supply CSSC and supply-specific data are retrieved from memory of the supply. Additionally, a system CSSC and system-specific data are retrieved from memory of the identification card manufacturing system. The supply CSSC and the system CSSC are translated using the supply-specific data and the system-specific data, respectively. Finally, the supply is authorized for use with the identification card manufacturing system when the translated system CSSC and the translated supply CSSC correspond.

CROSS REFERENCE TO RELATED APPLICATION

[0001] The present application claims the benefit of U.S. ProvisionalPatent Application Serial No. 60/373,967, filed Apr. 19, 2002 and U.S.Provisional Patent Application Serial No. 60/361,253, filed Mar. 1,2002, the contents of which are hereby incorporated by reference intheir entirety.

FIELD OF THE INVENTION

[0002] The present invention generally relates to identification cardmanufacturing and, more particularly, to security for identificationcard manufacturing systems to prevent unauthorized use of identificationcard manufacturing devices and corresponding supplies.

BACKGROUND OF THE INVENTION

[0003] Identification card manufacturing systems generally include acomputer, at least one card manufacturing application running on thecomputer, and at least one identification card manufacturing device suchas an identification card printer or laminator. In the case of anidentification card printer, the card manufacturing application cancombine textual and graphical information to form a print jobcorresponding to an image that is to be printed by the identificationcard printer. The print job can then be processed by the identificationcard printer by printing an image to a card substrate fed from a cardsupply using a thermal print mechanism or an ink jet print mechanism.The thermal print mechanism utilizes a thermal print ribbon supply,whereas the ink jet print mechanism utilizes an ink cartridge supply.When the identification card manufacturing device is a laminator, thecard producing application can control the operation of theidentification card laminator to laminate the printed card using anoverlaminate supply. Other identification card processing devices, suchas data encoders and card flippers, can also be controlled by theidentification card manufacturing application.

[0004] Security from counterfeiting of identification cards is in highdemand. Methods of providing such security have been employed to producean identification card that is made difficult to copy or modify. Forexample, printed identification cards can be laminated with anoverlaminate supply that includes custom security markings, such asholograms. Also, the identification card can include special layers ofmaterials that reveal attempts to tamper with the card. However, such aninvestment in customized supplies can provide a false sense of securityfrom counterfeiting.

[0005] For example, the above methods of enhancing security fromcounterfeiting and tampering can be overcome by a counterfeiter thatgains access to the custom supplies. The counterfeiter can then obtainan identification card manufacturing system and use the custom suppliesto possibly generate undetectable counterfeit identification cards.

[0006] A continuing need exists for improved identification cardmanufacturing security and, more particularly, improved security fromidentification card counterfeiting.

SUMMARY OF THE INVENTION

[0007] The present invention improves identification card manufacturingsecurity by restricting an identification card manufacturing system tooperate only with authorized supplies. In accordance with this aspect ofthe invention, a supply-specific security code (SSSC) andsupply-specific data are stored in memory of the identification cardmanufacturing system supply. The SSSC is translated using thesupply-specific data. Finally, the supply is authorized for use with theidentification card manufacturing system only when the translated SSSCis found to be valid. In this manner, the identification cardmanufacturing system can be precluded from operating with supplies thatare determined to be invalid.

[0008] In accordance with another aspect of the invention,identification card manufacturing systems are configured to operate onlywith supplies having corresponding customer-specific security codes(CSSC). In accordance with this aspect of the invention, a supply CSSCand supply-specific data are retrieved from memory of the supply.Additionally, a system CSSC and system-specific data are retrieved frommemory of the identification card manufacturing system. The supply CSSCand the system CSSC are translated using the supply-specific data andthe system-specific data, respectively. Finally, the supply isauthorized for use with the identification card manufacturing systemwhen the translated system CSSC and the translated supply CSSCcorrespond.

[0009] Another aspect of the present invention is directed to a methodof configuring an identification card manufacturing system to operateonly with supplies having corresponding CSSC's. Here, a CSSC isgenerated for a customer. Next, the CSSC is stored in a secure data baseand in memory of an supply. Finally, the identification cardmanufacturing system is configured to operate only with supplies havingthe CSSC.

BRIEF DESCRIPTION OF THE DRAWINGS

[0010]FIG. 1 is a simplified diagram of an identification cardmanufacturing system in accordance with embodiments of the invention.

[0011]FIG. 2 is a flowchart illustrating a security check performed inaccordance with an embodiment of the invention.

[0012]FIG. 3 is a flowchart illustrating a security check in accordancewith an embodiment of the invention.

[0013]FIG. 4 is a simplified block diagram illustrating a method inwhich custom supplies and their corresponding identification cardmanufacturing systems are formed.

[0014]FIG. 5 is a flowchart illustrating a method that can beimplemented by the identification card manufacturing system to performthe security checks illustrated in flowcharts of FIGS. 2 and 3.

DETAILED DESCRIPTION OF THE DRAWINGS

[0015]FIG. 1 is a schematic diagram of an identification cardmanufacturing system 10, in accordance with embodiments of theinvention. System 10 generally includes a computer 12 having a cardmanufacturing application and driver software 14 stored in memory 16.System 10 also includes an identification card manufacturing device 20that is controlled by application 14 to process an identification cardin some manner. One alternative to system 10 of FIG. 1 is to configureidentification card manufacturing device 20 to include a microcomputerthat is capable of executing the application 14 in order to eliminatethe need for a separate computer 12.

[0016] Identification card manufacturing device 20 includes a controller22, memory 24 and one or more supplies that are generally designated as26. Controller 22 receives instructions from application and driversoftware 14 to process an identification card accordingly. Device 20 canbe an identification card printer, an identification card laminator, orother card manufacturing device. The printing, laminating and other cardprocessing components of device 20 are not shown to simplify theillustration and the discussion of the invention.

[0017] Supply 26 can include a card supply 26A, a printer supply 26B, alaminator supply 26C or other card manufacturing supply. Card supply 26Acan include a card cartridge or card holder that includes a supply ofindividual identification cards for feeding to a card processingcomponent of device 20. Printer supply 26B can be a thermal print ribbonfor use with a thermal printhead, or an ink cartridge for use with anink jet printhead. Laminator supply 26C can be a supply of overlaminatematerial for use with a laminator that is applied to a surface of acard.

[0018] Each of the supplies 26 includes a memory 28 that is accessibleby controller 22 through a supply reader 30. Supply reader 30 cancommunicate with the memory 28 of each supply 26 through a directelectrical connection or through a wireless connection using radiofrequency (RF) communication methods and provide data contained thereinto controller 22. Controller 22 can analyze the data and/or communicatethe data to application 14.

[0019] The data contained in the memory 28 of the supplies 26 caninclude general information about the supply. For example, memory 28 caninclude information as to whether the supply 26 is a card supply 26A, aprinter supply 26B, a laminator supply 26C or other type of supply.Additionally, general supply information such as the number of cardscontained in the new card supply 26A, the amount of ink or type of inkstored in the printer supply 26B, and the amount of overlaminatematerial and type of overlaminate material stored in the laminator 26C.Additionally, the data can include supply-specific data 32 that relatesto the specific supply. This supply-specific data can include, forexample, a unique serial number, unique date information (e.g.,expiration date, date produced, date shipped, etc.), and other data thatis substantially unique to the particular supply.

[0020] In accordance with an embodiment of the invention, memory 28includes a supply-specific security code (SSSC) 34 that is eitherencoded using the supply-specific data 32, such as the serial number, oris encrypted using the supply-specific data 32 and a private key that isnot stored in the supply memory 28. As a result, the SSSC is unique foreach supply 26. That is, SSSC 34A of card supply 26A is different fromSSSC 34B of printer supply 26B and SSSC 34C of laminator supply 26C, aswell as other card supplies. The private key used to encrypt the SSSC 34can be stored, for example, in memory 24 of card manufacturing device 20as indicated at 36, in memory 16 of computer 12, or contained in memory38 of a card key 40 that can be read by a card reader 42.

[0021] In accordance with one embodiment of the invention, a first levelsecurity check is performed in accordance with the flowchart illustratedin FIG. 2. At step 44, SSSC 34 and supply-specific data 32 are retrievedfrom memory 28 of a card supply 26. This is generally accomplished usingsupply reader 30 under control of controller 22. Next, at step 46, theSSSC 34 is translated using the supply-specific data 32. This can beaccomplished by controller 22 or by computer 12 in accordance withinstructions from application 14. This translation of SSSC 34 generallyinvolves deciphering or decoding SSSC 34 using supply-specific data 32in accordance with a predefined algorithm. Alternatively, SSSC 34 can bedecrypted using the supply-specific data 32 and a corresponding privatekey 48 stored in system memory 24 or other locations as described above.

[0022] At step 50, use of the supply 26 with the identification cardmanufacturing system 10 is authorized when the translated SSSC 34 isdetermined to be valid. In accordance with one embodiment, thisauthorizing step involves comparing the translated SSSC 34 of the supply26 to an authorization code 52 stored in system memory 24. Thetranslated SSSC 34 is determined to be valid when it matches orotherwise corresponds to the authorization code 52. If found to bevalid, identification card manufacturing system 10 can be enabled foroperation with the supply 26. If the supply 26 is found to be invalid,system 10 can trigger an interlocking mechanism using, for examplecontroller 22, to preclude operation of system 10 with the invalidsupply 26.

[0023] In accordance with another aspect of the present invention,identification card manufacturing system 10 can be configured to operateonly with supplies 26 that have been customized for use by a particularcustomer. In accordance with one embodiment, both the supply 26 and theidentification card manufacturing system 10 include a customer-specificsecurity code (CSSC). The supply CSSC 60 stored in supply memory 28 iseither encoded using the supply-specific data 32 or is encrypted usingthe supply-specific data 32 and a private key that is preferablydifferent from the private key (key 48) of memory 24 used to encrypt theSSSC 34.

[0024] Similarly, a system CSSC 62 is stored in system memory 24. Memory16 can also operate as a system memory storing the system CSSC and otherinformation described below. The system CSSC 62 is preferably encodedusing system-specific data 64, or encrypted using system-specific data64 and a private key that is preferably different from the private keyused to encrypt the supply CSSC 60 of the supply 26. The system CSSC 62can take the form of a device CSSC corresponding to device 20 that ispreferably stored as shown in memory 24, or an application CSSC 62corresponding to application 14 that is preferably stored in memory 16of computer 12. System 10 can utilize both application and device CSSC's62. The system-specific data 64 is a serial number or other informationthat uniquely identifies device 20 (device-specific data) or application14 (application-specific data) of system 10. The private keys used toencrypt the supply and system CSSC's are preferably stored outside ofsupply memory 28 or system memory 24. In accordance with one embodiment,the private key used in encrypt the supply and system CSSC's is storedin memory 37 of card key 38.

[0025]FIG. 3 is a flowchart illustrating operation of the system 10 witha supply 26 having a supply CSSC 60. At step 70, a supply CSSC 60 andsupply-specific data 32 are retrieved from memory 28 of supply 26. Asdiscussed above, this reading of memory 28 can be accomplished throughsupply reader 30 by controller 22. The supply CSSC 60 andsupply-specific data 32 can be analyzed by controller 22 or by computer12 in accordance with instructions from application 14. Next, at 72, asystem CSSC 62 and system-specific data 64 are retrieved from memory 24of identification card manufacturing system 10. The supply CSSC 60 istranslated using the supply-specific data 32 at 174. As discussed above,this can be accomplished by controller 22 or application 14. Similarly,the system CSSC 62 is translated using the system-specific data 64, at76. Finally, at 78, use of the supply 26 with the system 10 isauthorized when the translated system CSSC 62 and the translated supplyCSSC 60 correspond.

[0026] Prior to the first use of identification card manufacturingsystem 10 with a customized supply, the system 10 may be set up as ageneric system. Accordingly, the initial system CSSC 62 mentioned abovecould be in the form of a generic code. In accordance with oneembodiment, the first use of identification card system 10 with acustomized supply 26 causes the generic code to be replaced with asystem CSSC that is preferably generated using the translated supplyCSSC 60 and system specific data 64.

[0027] The translations of the supply CSSC 60 and the system CSSC 62 canbe accomplished as described above by deciphering or decoding the CSSC'susing the corresponding supply-specific data 32 and the system-specificdata 64. Alternatively, the translating steps can be accomplished bydecrypting the system CSSC 62 and the supply CSSC 60 using anappropriate private key. For example, the supply CSSC 60 can bedecrypted using a private key that is stored in memory 37 of card key 38or in system memory 24.

[0028]FIG. 4 is a simplified block diagram illustrating a method inwhich custom supplies 26 and their corresponding systems 10 includingcard manufacturing device 20 and application and driver software 14 areformed. Initially, a customer requests to be provided a custom system 10with custom card manufacturing supplies 26, as indicated at box 80. Thecustomer's order is typically provided to a dealer 82 of theidentification card manufacturing systems 10 and supplies 26, ordirectly to the manufacturer 84 of the devices 20 and supplies 26. Oncethe order is made, the customer is assigned a secret CSSC as indicatedat box 86, which is then stored in a secure database 88. This featureallows a specific custom supply 26 to be matched to the correspondingcustom device 20 and/or application 14.

[0029] Identification card manufacturing devices 20 and supplies 26 arepreferably initially programmed to operate as generic devices byapplying or storing a generic security code in the respective memories24 and 28, or in the data of the application 14, as indicated at box 90.A supply CSSC 60 corresponding to the CSSC assigned to the customer isthen programmed into memory 28 of supply 26 as indicated at box 92. Asmentioned above, the supply CSSC 60 is preferably encoded or encryptedusing the supply specific data 34 that is unique to the supply 26.

[0030] In accordance with one embodiment, card manufacturing device 20can also be programmed with the CSSC assigned to the customer by storingit in memory 24 and/or including it in the application 14.Alternatively, the installation of a custom supply 26 having a CSSC 60automatically causes the generic security code of the device 20 orapplication 14 to be updated to correspond to the supply CSSC. Thisallows generic devices 20 that are already in the possession of thecustomer to be updated to operate as custom devices. Once this occurs,the device 20 will only operate with custom supplies 26 having thecorresponding supply CSSC 60.

[0031] As mentioned above, it is also possible for the customer toobtain custom devices 20 and supplies 26 through an authorized dealer82. Here, generic devices 20 and supplies 26 are shipped to the dealer82 from the manufacturer 84. For new customers, the dealer can request asecret CSSC for the customer from the manufacturer 82, which is thenstored in the secure database 88. When customers with assigned CSSC'ssubmit new orders to the dealer 82, the dealer 82 may access thedatabase 84 and retrieve the CSSC corresponding to the customer. TheCSSC can then be applied to the supply 26 or the device 20 prior toshipment to the customer by the dealer as indicated at box 94.

[0032] It should be understood that the dealer can actually be treatedas the customer where the manufacturer of the systems provides thedealer with a unique CSSC. The dealer then provides systems 10 andsupplies 26 that all operate with devices 20, applications 14, andsupplies 26 having the corresponding CSSC's.

[0033] In summary, card manufacturing supplies 26 and identificationcard manufacturing devices 20 and applications 14 can be configured toinclude a secret CSSC relating to a customer, which limits their useonly with corresponding custom components. Initially, a CSSC isgenerated at 86 for a customer. The CSSC can be based upon a customerorder 80. Next, the CSSC is stored in a secure database 88 and in memory28 of the card manufacturing supply 26, as indicated at 92. Finally, theidentification card manufacturing system 10 including identificationcard manufacturing application 14 and device 20 are configured tooperate only with supplies 26 having a CSSC. This can be accomplishedeither by storing the corresponding CSSC 62 in the memory 24 of thedevice 20 or in the data system of the application 14, or by generatingthe system CSSC 62 automatically when the generic device 20 orapplication 14 is used with the custom supply 26 for the first time.Following such a use, the identification card manufacturing system 10 isconfigured to only operate with the custom supplies 26 having thecorresponding CSSC.

[0034]FIG. 5 is a flowchart illustrating a method that can beimplemented by the identification card manufacturing system 10 toperform the above-described security checks. It should be understoodthat the presented method is only one example of how the desiredidentification card manufacturing security can be implemented and thatadditional steps may be added or removed, or be performed in a differentorder without departing from the spirit and scope of the presentinvention. The method generally starts at 100 with a request to performa card processing function, such as process a print job, or perform someother card processing function using identification card manufacturingsystem 10. This causes application and driver software 14 or controller22 to request a read of supply memory 28. Next, at 102, controller 22reads memory 28 of supply 26 using supply reader 30 and either providesthe data directly to application 14 or implements the first level ofsecurity described above, as indicated at 104, by translating the SSSC34 using the supply-specific data 32. The supply 26 is then validated bychecking whether the translated SSSC 34 matches a corresponding code,such as authorization code 52 stored in system memory 24, as indicatedat 106. If the supply 26 is determined to be invalid, the method movesto 108 where controller 22 notifies application 14 that supply 26 isinvalid. Additionally, the user of system 10 can be notified that thesupply 26 is invalid, as indicated at 110. Identification cardmanufacturing system 10 is then disabled from use with the supply 26 andthe card processing job is terminated.

[0035] In accordance with another embodiment of the invention, a secondlevel security check is performed when it is determined at 106 that thesupply 26 is valid. At step 112, the supply SSSC 60 is retrieved alongwith the supply data 32, if necessary. Next, at 114, the system CSSC 62and system-specific data 64 are retrieved. The supply CSSC 60 and thesystem CSSC 62 are then translated at 116 using the supply-specific data32 and the system-specific data 64, respectively.

[0036] At 118, a comparison is made between the translated supply CSSC60 and the translated system CSSC 62 to determine whether theycorrespond or match. If they do not correspond, it may be due to thesystem CSSC 62 being a generic code. Accordingly, a check is made todetermine whether the system CSSC 62 is generic at 120. If the systemCSSC 62 is a generic code, a CSSC corresponding to the supply CSSC 60 isgenerated and stored in memory 24 at 122. In accordance with oneembodiment, the system CSSC 62 is generated using the translated supplyCSSC 60, system-specific data 64, and/or a private key. As a result,identification card manufacturing system 10 is thereafter configured tooperate only with supplies 26 having the corresponding CSSC.

[0037] In the event that the system CSSC 62 is not a generic CSSC, thenit has been customized for use with corresponding customized supplies 26that are different than the supplies 26 being used for the current cardprocessing function. Accordingly, operation of system 10 with theinstalled supply 26 is prevented and the card processing job isterminated. The user of system 10 can then be notified of theunauthorized supply, as indicated at 110.

[0038] In the event that it is determined at 118 that the translatedsupply CSSC 60 and the translated system CSSC 62 correspond, supply 26is authorized for use with system 10. The card processing job is,therefore, allowed to commence as indicated at 124.

[0039] Although the present invention has been described with referenceto preferred embodiments, workers skilled in the art will recognize thatchanges may be made in form and detail without departing from the spiritand scope of the invention. For example, those skilled in the artunderstand that the translations of the supply SSSC's and the supply andsystem CSSC's can be accomplished in many different ways. The generalpurpose of the translation is to perform some manipulation (decoding,deciphering or decrypting) to the supply SSSC, the supply CSSC, and/orthe corresponding reference. The resulting translation is then used todetermine whether the supply is authorized for use with theidentification card manufacturing system. Accordingly, a translation ofa supply SSSC, a supply CSSC, or a system CSSC can involve a directmanipulation of the code and/or a direct manipulation of thecorresponding reference that is used to authorize use of the supply withthe identification card manufacturing system. For example, thetranslation of a supply SSSC can involve direct manipulation of: thesupply SSSC using the supply-specific data in some manner; thecorresponding reference (e.g., authentication code) using thesupply-specific data; or both the supply SSSC and the correspondingreference using the supply-specific data. Likewise, the translation ofthe supply CSSC can involve direct manipulation of: the supply CSSCusing the supply-specific data in some manner; the correspondingreference (e.g., the system CSSC) using the supply-specific data; orboth the supply SSSC and the corresponding reference using the supplyspecific data. The translation of the system CSSC can be made in thesame manner. Thus, it is possible that the translations of the supplyand system CSSC's involve manipulation of only the supply CSSC or thesystem CSSC.

What is claimed is:
 1. A method of authorizing a supply for use with anidentification card manufacturing system comprising steps of: a)retrieving a supply-specific security code (SSSC) and supply-specificdata from a memory of the supply; b) translating the SSSC using thesupply-specific data; and c) authorizing use of the supply with theidentification card manufacturing system when the translated SSSC isvalid.
 2. The method off claim 1, wherein the authorizing step c)includes comparing the translated SSSC to a supply authorization code,wherein the translated SSSC is valid when it corresponds to the supplyauthorization code.
 3. The method of claim 1 including d) precluding useof the supply with the identification card manufacturing system when thetranslated SSSC is not valid.
 4. The method of claim 1, wherein thetranslating step b) includes decoding or decrypting the supply SSSCusing the supply-specific data.
 5. The method of claim 1 including: d)retrieving a supply customer-specific security code (CSSC); e)retrieving a system CSSC and system-specific data; f) translating thesupply CSSC using the supply-specific data; g) translating the systemCSSC using the system-specific data; and h) authorizing use of thesupply with the identification card manufacturing system when thetranslated system CSSC and the translated supply CSSC correspond.
 6. Themethod of claim 5, wherein the system CSSC is an application CSSC andthe system-specific data is application-specific data.
 7. The method ofclaim 5, wherein the system CSSC is an identification card manufacturingdevice CSSC and the system-specific data is an identification cardmanufacturing device-specific data.
 8. The method of claim 5 including:i) precluding use of the supply with the identification cardmanufacturing system when the translated supply CSSC and the translatedsystem CSSC do not correspond.
 9. The method of claim 1, wherein thesupply is a card supply, and ink cartridge, a thermal print ribbon or anoverlaminate supply.
 10. A method of authorizing use of a supply with anidentification card manufacturing system comprising steps of: a)retrieving a supply customer-specific security code (CSSC) andsupply-specific data from a memory of the supply; b) retrieving a systemCSSC and system-specific data from a memory of the identification cardmanufacturing system; c) translating the supply CSSC using thesupply-specific data; d) translating the system CSSC using thesystem-specific data; and e) authorizing use of the supply with theidentification card manufacturing system when the translated system CSSCand the translated supply CSSC correspond.
 11. The method of claim 10,wherein the system CSSC is an application CSSC and the system-specificdata is application-specific data.
 12. The method of claim 10, whereinthe system CSSC is an identification card manufacturing device CSSC andthe system-specific data is identification card manufacturingdevice-specific data.
 13. The method of claim 10 including f) precludinguse of the supply with the identification card manufacturing system whenthe translated supply CSSC and the translated system CSSC do notcorrespond.
 14. The method of claim 10, wherein the translating step c)includes decrypting or decoding the supply CSSC using a private keystored in the memory of the identification card manufacturing system.15. The method of claim 10, wherein the translating step d) includesdecrypting or decoding the system CSSC using a private key stored in thememory of the identification card manufacturing system.
 16. The methodof claim 10, wherein the authorizing step e) includes comparing thetranslated supply CSSC to the translated system CSSC, wherein the supplyis authorized for use with the system when the translated supply CSSCmatches the translated system CSSC.
 17. The method of claim 10including: f) retrieving a supply-specific security code (SSSC); g)translating the SSSC using the supply-specific data; h) authorizing useof the supply with the identification card manufacturing system when thetranslated SSSC is valid.
 18. The method of claim 17, wherein theauthorizing step h) includes comparing the translated SSSC to a supplyauthorization code stored in the memory of the identification cardmanufacturing system, whereby the supply is valid only if the translatedSSSC corresponds to the supply authorization code.
 19. The method ofclaim 10, wherein the supply is a card supply, an ink cartridge, athermal print ribbon or an overlaminate supply.
 20. An identificationcard manufacturing system comprising: an identification cardmanufacturing device; a supply configured for use with theidentification card manufacturing device, the supply including a memorycontaining a supply-specific security code (SSSC) and supply-specificdata; an application including instructions executable by amicroprocessor comprising: a) retrieving the SSSC and thesupply-specific data from the memory of the supply; b) translating theSSSC using the supply-specific data; and c) authorizing the use of thesupply with the identification card manufacturing device using thetranslated SSSC.
 21. The system of claim 20, wherein the supply is acard supply, an ink cartridge, a thermal print ribbon, or anoverlaminate supply.
 22. An identification card manufacturing systemcomprising: an identification card manufacturing device; a supplyconfigured for use with the identification card manufacturing device,the supply including a memory containing a supply customer-specificsecurity code (CSSC) and supply-specific data; and an applicationincluding instructions executable by a microprocessor comprising: a)retrieving the supply CSSC and supply-specific data from the memory ofthe supply; b) retrieving a system CSSC and system-specific data; c)translating the supply CSSC using the supply-specific data; d)translating the system CSSC using the system-specific data; and e)authorizing the use of the supply with the identification cardmanufacturing device when the translated system CSSC and the translatedsupply CSSC correspond.
 23. The system of claim 22, wherein the supplyis a card supply, an ink cartridge, a thermal print ribbon or anoverlaminate supply.
 24. A method of providing supplies that areauthorized for use with specific identification card manufacturingsystems, the method comprising steps of: a) generating acustomer-specific security code (CSSC) for a customer; b) storing theCSSC in a secure database; c) storing the CSSC in a memory of an supply;and d) configuring an identification card manufacturing system tooperate only with supplies having the CSSC.
 25. The method of claim 24,wherein the storing step c) involves replacing a stored generic codewith the CSSC.
 26. The method of claim 24, wherein the storing step c)is conducted by a dealer of the identification card manufacturingsystem.
 27. The method of claim 24, wherein the configuring step d)involves replacing a generic code stored in a memory of theidentification card manufacturing system with the CSSC.
 28. The methodof claim 24, wherein the configuring step (d) involves updating ageneric code corresponding to the identification card manufacturingsystem with the CSSC when the system is operated with the supply for thefirst time.
 29. The method of claim 24, wherein the CSSC is encoded orencrypted.
 30. The method of claim 27, wherein the identification cardmanufacturing system includes an identification card printer having thememory.
 31. The method of claim 24, wherein: the identification cardmanufacturing system includes a card producing application having accessto the memory of the identification card producing system; and theconfiguring step d) involves updating a generic code corresponding tothe identification card manufacturing system with the CSSC using theapplication when the system is operated with the supply for the firsttime.
 32. A method of providing supplies that are authorized for usewith specific identification card manufacturing systems, the methodcomprising steps of: a) generating a customer-specific security code(CSSC) for a customer; b) storing the CSSC in a secure database; c)providing an supply having a memory containing supply-specific data; d)encrypting or encoding the CSSC using the supply-specific data to form aunique supply CSSC; e) storing the supply CSSC in the memory of thesupply; and f) configuring an identification card manufacturing systemto operate only with supplies having a supply CSSC that, when decryptedor decoded using the supply-specific data, corresponds to the CSSC. 33.The method of claim 32, wherein the configuring step f) involvesreplacing a stored generic code with the CSSC.
 34. The method of claim32, wherein the configuring step f) involves replacing a generic codestored in a memory of the identification card manufacturing system withthe CSSC.
 35. The method of claim 32, wherein the configuring step f)involves updating a generic code corresponding to the identificationcard manufacturing system with the CSSC when the system is operated withthe supply for the first time.
 36. The method of claim 34, wherein theidentification card manufacturing system includes an identification cardprinter having the memory.
 37. The method of claim 32, wherein: theidentification card manufacturing system includes a card producingapplication having access to the memory of the identification cardproducing system; and the configuring step f) involves updating ageneric code corresponding to the identification card manufacturingsystem with the CSSC using the application when the system is operatedwith the supply for the first time.