RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The RFID device serves the same purpose as a bar code or a magnetic stripe; it provides a unique identifier for that object. RFID is fast, reliable, and can be read from up to several feet away, and does not need to be within direct line-of-sight of the reader to be tracked. In contrast, must align barcodes with a scanner and swiped magnetic stripe access cards through a reader.

RFID belongs to a group of technologies referred to as Automatic Identification and Data Capture (AIDC). AIDC methods automatically identify objects, collect data about them, and enter those data directly into computer systems with little or no human intervention. RFID uses radiofrequency waves to transfer data between a reader and an electronic tag (microchip) attached to an object for identification and tracking.


Usually, RFID access control systems consist of the following components: 1) reader that connects to (or integrated with) 2) an antenna that sends out a radio signal to 3) a tag (microchip) that returns the signal with information added. To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator (reader) emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The reader will then transmit the read results to an RFID computer program.

Radio-frequency identification (RFID) uses electromagnetic fields to identify and track tags attached to objects automatically. The titles contain electronically stored information. RFID tags can be either passive, active, or battery-assisted passive. Passive tags are cheaper and smaller because it has no battery; instead, the title collects the radio energy transmitted by a nearby RFID reader. Active tags have a local power source (such as a battery) and may operate hundreds of meters from the RFID reader. A battery-assisted passive (BAP) has a small battery on board. It is activated when in the presence of an RFID reader.


RFID is, for example, used on access control systems to identify clients by healthcare agencies. Animals in livestock management systems, students who use lockers to store belongings, and taxis who request access to passenger pick-up areas at airports. RFID readers are usually connecting to another plan. For example, an employee would have an access control access card with an RFID tag in an access control system. The reader would be a smartcard reader that is mounted next to the secured doors. Would connect the reader to an access control system. In the access control system, access rights for people store, and people link to a number. This number is also storing on the RFID card. If the access control system gets information from the reader, it will look in its database to check its access rights. If so, the system would be sending a signal to a door that can open it.

RFID tags are also widely used in identification badges and replacing earlier magnetic stripe cards. These badges need only to be held within a certain distance of the reader to authenticate the holder. Can also place a tag on vehicles, which can be read at a distance to allow entrance to controlled areas without stopping the car and presenting a card or entering an access code.

Other Applications: ID Badging Timing Contactless Payments Personell and Animal Tracking Travel Documents Barcodes and security tags Controlling Access to Restricted Areas Healthcare Data Management

RFID access control systems and how integrating this technology into your home or business can significantly benefit you. Are you considering implementing an RFID Solution? Please take the next step and contact us at Dicsan Technology for more information about RFID.


Peace of mind

Stations, cabling, backups. Let us handle every equipment in your network while you focus on growing your business.

Remote support

Remote monitoring enable us to access and repair most problems right from our location reducing response times significantly.

Increase efficiency

24/7 monitoring allows us to proactively detect any potential problem to avoid substantial cost and prevent downtime.

Vendors negotiation

We will deal with vendors and partners to find the best proposes for your business and we will advise the most adequate solution to your needs.

Skilled team

A professional, well-trained, competent staff that can be trusted using proven processes and advanced technologies.

One payment: many services

You will be able to plan ahead for IT and security projects just like every other utility service and avoid unexpected emergency costs or hidden fees.

Miami-Dade County:

Aventura, Bal Harbour, Bay Harbor Islands, Biscayne Park, Coral Gables, Cutler Bay, Doral, El Portal, Florida City, Golden Beach, Hialeah, Hialeah Gardens, Homestead, Indian Creek, Key Biscayne, Medley, Miami, Miami Beach, Miami Gardens, Miami Lakes, Miami Shores, Miami Springs, North Bay Village, North Miami, North Miami Beach, Opa-Locka, Palmetto Bay, Pinecrest, South Miami, Sunny Isles Beach, Suftside, Sweetwater, Virginia Gardens, and West Miami.

Broward County:

Boulevard Gardens, Broadview Park, Coconut Creek, Cooper City, Coral Springs, Dania Beach, Davie, Deerfield Beach, Fort Lauderdale, Franklin Park, Hallandale Beach, Hillsboro Beach, Hillsboro Pines, Hollywood, Lauderdale Lakes, Lauderdale-by-the-Sea, Lauderhill, Lazy Lake, Lighthouse Point, Margate, Miramar, North Lauderdale, Oakland Park, Parkland, Pembroke Park, Pembroke Pines, Pine Island Ridge, Plantation, Pompano Beach, Roosevelt Gardens, Sea Ranch Lakes, Southwest Ranches, Sunrise, Sunshine Acres, Tamarac, Washington Park, West Park, Weston, and Wilton Manors.