ACCESS CONTROL SYSTEMS

ACCESS CONTROL SYSTEMS

WHAT IS RFID?

RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The RFID device serves the same purpose as a bar code or a magnetic stripe; it provides a unique identifier for that object. RFID is fast, reliable, and can be read from up to several feet away and does not need to be within direct line-of-sight of the reader to be tracked, whereas barcodes must be aligned with a scanner and magnetic stripe access cards most be swiped through a reader.

RFID belongs to a group of technologies referred to as Automatic Identification and Data Capture (AIDC). AIDC methods automatically identify objects, collect data about them, and enter those data directly into computer systems with little or no human intervention. RFID uses radio frequency waves to transfer data between a reader and an electronic tag (micro-chip) attached to an object, for purpose of identification and/or tracking.

HOW DOES A RFID SYSTEM WORK?

Usually RFID access control systems consist of the following components: 1) reader that is connected to (or integrated with) 2) an antenna, that sends out a radio signal to 3) a tag (micro-chip) that returns the signal with information added. To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator (reader) emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The reader will then transmit the read results to an RFID computer program.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFID tags can be either passive, active or battery-assisted passive. Passive tags are cheaper and smaller because it has no battery; instead, the tag collects the radio energy transmitted by a nearby RFID reader. Active tags have a local power source (such as a battery) and may operate hundreds of meters from the RFID reader. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader.

WHAT IS RFID USED FOR?

RFID is, for example, used on access control systems, to identify clients by healthcare agencies, animals in livestock management systems, students that use lockers to store belongings and taxis that request access to passenger pick-up areas at airports. RFID readers are usually connected to another system. For example, in access control system an employee would have an access control access card with a RFID tag. The reader would be a smartcard reader that is mounted next to the secured doors. The reader would be connected to an access control system. In the access control system access rights for people are stored and people are linked to a number. This number is also stored on the RFID card. If the access control system gets information from the reader, it will look in its database to check if this person has access rights. If so, the system would be sending a signal to a door that it can be opened.

RFID tags are also widely used in identification badges, and replacing earlier magnetic stripe cards. These badges need to only be held within a certain distance of the reader to authenticate the holder. Tags can also be placed on vehicles, which can be read at a distance, to allow entrance to controlled areas without having to stop the vehicle and present a card or enter an access code.

Other Applications: ID Badging Timing Contactless Payments Personell and Animal Tracking Travel Documents Barcodes and security tags Controlling Access to Restricted Areas Healthcare Data Management

Are you considering implementing an RFID Solution? Take the next step and contact us at Dicsan Technology for more information about RFID and RFID access control systems and how integrating this technology into your home or business can be of great benefits.

INTRODUCTION TO ACCESS CONTROL

In the fields of physical security, Access control is any mechanism or system that is used to control access into or out of any area through the authorization or revocation of rights to physical or logical assets within a business or home.

ACCESS CONTROL TESTING READERS

Access control card readers are one of the major component of an Access Control System. These are used to read the encrypted data on an access card and allow or deny access based on the card information with the feedback from the control panel.

ACCESS CONTROL: CREDENTIALS

The standard form of today’s access control is an “access card” instead of the standard metal key and lock system to grant access to the secured area. There are different types of access cards and each require an access control system card reader.

ACCESS CONTROL: RFID

RFID stands for Radio-Frequency IDentification. The RFID device serves the same purpose as a bar code or a magnetic stripe; it provides a unique identifier for that object. RFID is fast, reliable, and can be read from up to several feet away.

ACCESS CONTROL: SENSOR

Motion sensors are found everywhere today and function by detecting a vehicle or person approaching an exit and unlock the door. Due to their motion sensor they can trigger motion and thus unlock the door right when you walk up to the door to exit the space.

ACCESS CONTROL: CONTROLLERS

Access controllers are split through many types of control models an features, all of them providing the essential services of authorization, identification and authentication.

ACCESS CONTROL: DATABASE-SERVER

Every access control system needs a server where the permissions are stored in an access database. It is really the server which makes the decision if the doors should unlock or not by matching the presented credential to the credentials authorized for this door.

KEYLESS DOORS: MAGLOCKS/STRIKES

Magnetic locks and electric strikes are electrical hardware devices used to maintain the security of a door opening. Both of these devices can be activated by a range of tools, including passcodes, biometric readers, keycards or buzzers.

BENEFITS

Peace of mind

Stations, cabling, backups. Let us handle every equipment in your network while you focus on growing your business.

Remote support

Remote monitoring enable us to access and repair most problems right from our location reducing response times significantly.

Increase efficiency

24/7 monitoring allows us to proactively detect any potential problem to avoid substantial cost and prevent downtime.

Vendors negotiation

We will deal with vendors and partners to find the best proposes for your business and we will advise the most adequate solution to your needs.

Skilled team

A professional, well-trained, competent staff that can be trusted using proven processes and advanced technologies.

One payment: many services

You will be able to plan ahead for IT and security projects just like every other utility service and avoid unexpected emergency costs or hidden fees.

Miami-Dade County:

Aventura, Bal Harbour, Bay Harbor Islands, Biscayne Park, Coral Gables, Cutler Bay, Doral, El Portal, Florida City, Golden Beach, Hialeah, Hialeah Gardens, Homestead, Indian Creek, Key Biscayne, Medley, Miami, Miami Beach, Miami Gardens, Miami Lakes, Miami Shores, Miami Springs, North Bay Village, North Miami, North Miami Beach, Opa-Locka, Palmetto Bay, Pinecrest, South Miami, Sunny Isles Beach, Suftside, Sweetwater, Virginia Gardens, and West Miami.

Broward County:

Boulevard Gardens, Broadview Park, Coconut Creek, Cooper City, Coral Springs, Dania Beach, Davie, Deerfield Beach, Fort Lauderdale, Franklin Park, Hallandale Beach, Hillsboro Beach, Hillsboro Pines, Hollywood, Lauderdale Lakes, Lauderdale-by-the-Sea, Lauderhill, Lazy Lake, Lighthouse Point, Margate, Miramar, North Lauderdale, Oakland Park, Parkland, Pembroke Park, Pembroke Pines, Pine Island Ridge, Plantation, Pompano Beach, Roosevelt Gardens, Sea Ranch Lakes, Southwest Ranches, Sunrise, Sunshine Acres, Tamarac, Washington Park, West Park, Weston, and Wilton Manors.