-
RFID security access control can prevent theft and improve security, RFID access control system can effectively prevent unauthorized people from entering or carrying unauthorized items in and out, thereby reducing theft and improving security, when abnormal or unauthorized items are detected, the system can immediately send out an alarm and take corresponding measures.
-
The hardware part of the RFID system is mainly composed of readers, electronic tags, and RFD middleware.
1. Reader.
Composition: RF interface, logic control unit and antenna.
Antenna: An antenna is a device that converts received electromagnetic waves into current signals, or converts current signals into electromagnetic waves and emits them.
RF Interface Module:
1. Generate high-frequency emission energy, activate the electronic tag and provide it with energy.
2. Modulate the transmitted signal and transmit the data to the electronic tag.
3. Accept and modulate the RF signal from the electronic tag.
Logic Control Module:
1. Communicate with the application system software and execute the instructions sent from the application system software.
2. Control the communication process between the reader and the electronic tag.
3. Signal encoding and decoding.
4. Encrypt and decrypt the data transmitted between the reader and the tag.
5. Implement anti-collision algorithms.
6. Verify the identity of the reader and tag.
Second, the electronic label classification, composition and the function of each component.
According to the different working principles, electronic tags are divided into data carriers that use physical effects to work and data carriers that use electronic circuits as the theoretical basis.
3. RFID middleware.
1. Reader coordination control.
2. Data filtering and processing.
3. Data routing and integration.
4. Process management.
-
Taking Hikvision's access control system as an example, the access control system includes a main control computer, a fingerprint entry module, a card issuance module, a switch, a fingerprint, a password, a card controller, a face recognition host, a power supply, an electromagnetic lock, etc.
-
3. The overall concept of the design of the RFID access control system for the automatic access control management of vehicles in the community.
1.Design of access control system: (1) The access control system is composed of an access control controller, an RFID reader, a vehicle identifier, a vehicle input terminal, a vehicle output terminal, etc.; (2) The vehicle identifier identifies the vehicle through the Bihao RFID reader installed on the vehicle, thereby controlling the vehicle to enter and exit the community; (3) the vehicle input terminal can receive the several lines of town data that the RFID reader sends out, and sends it to the access control controller, thereby controlling the vehicle to enter and exit the community; (4) the vehicle output terminal can receive the signal that the access control controller sends the number of gears out of the coarse, thereby controlling the vehicle out of the community; (5) The access controller can control the switch of the access control, and judge whether the vehicle is allowed to enter and exit the community according to the RFID information of the vehicle.
2.System security: (1) Vehicle access control management is realized through RFID technology, which can effectively prevent counterfeit vehicles; (2) In the vehicle access control place, the installation of surveillance cameras, can realize the real-time monitoring of vehicle access; (3) The vehicle entry and exit records are stored in the database, which can effectively record the vehicle entry and exit situation for inquiry.
-
Summary. 1. Access controller, the core part of the access control system, is equivalent to the CPU of the computer, which is responsible for the processing and storage of the input and output information of the whole system, control and so on.
2. Card reader (identifier), a device that reads data (biometric information) in the card.
3. Electrically controlled lock, the executive component of the lock door in the access control system.
4. Card, the key to open the door. The cardholder's personal ** can be printed on the card, and the door opening card and badge can be combined into one.
5. Other equipment, <>
What are the components of a complete access control system? And what extended features do it have.
1. Access controller, the core part of the access control system, is equivalent to the CPU of the computer, which is responsible for the processing and storage of the input and output information of the whole system, control and so on. 2. Card reader (identifier), a device that reads and takes data (biometric information) from the card. 3. Electrically controlled lock, the executive component of the lock door bureau in the access control system.
4. Card, the key to open the door. You can print the cardholder's personal ** on the card, and the door opening card and badge are combined into one. 5. Other equipment, <>
It's incomplete. It's a complete <>
What about extensions. And what extended features do it have.
1) Go out button: press the device to open the door, which is suitable for the situation that there is no restriction on going out. 2), door magnet:
Use Bi Yan to destroy the safety switch status of the detection door. 3) Power supply: The jujube liquid power supply equipment of the entire hand-backed system is divided into two types: ordinary and backup (with battery).
-
In the simplest terms, the design scheme of the access control system needs to be composed of: demand analysis and technical scheme (system composition, scheme configuration description, system function) two parts. There are many specific refinements, such as the system composition, which is composed of the following parts:
1 Hardware system:
1) To enter self-service banking, customers first swipe their card (or passbook) through a magnetic stripe reader
2) The reader reads out the magnetic stripe information and transmits it to the access control host.
3) The host makes a judgment and records, and issues a command to open the door.
4) The access controller receives the instruction, and the infrared induction detection passes, and the control electric lock is opened.
5) After the door is opened for a certain delay, the door will be automatically closed and the electric lock will be locked.
6) When the customer's operation is completed, the automatic infrared detector will open the door or press the door opening button to go out.
2. Introduction to hardware components:
1) Electric lock: According to the different materials and installation methods of the door, such as wooden doors, glass doors, push-pull type, folio type, single leaf, double leaf, etc., it is equipped with corresponding electric locks: magnetic plate locks, electric plug locks, glass door clamp locks, etc.
2) Magnetic stripe reader: Because banks still use a large number of passbooks and magnetic cards, and passbooks and magnetic cards record information in the form of magnetic stripes, so according to the density and standard of magnetic stripes, the two or three magnetic stripe readers with good versatility are selected to take into account the brushing of magnetic cards and passbooks.
4) Go out button: The Australian Qisheng player press the switch, which is beautiful and generous.
5) Access controller: When the access control host receives the magnetic stripe information and infrared signal, it sends out the door opening instruction, transmits the information to the host, and controls the electric lock to open through the access control controller.
3 software modules: (1) control part, 2) data operation (data logging, record query, record backup and recovery), 3) user and password management, (4) report operation (report statistics, report preview and printing), (5) passenger flow statistics.
The software interface is as follows:
Flexible and unique main interface: client login interface, controller properties interface, and feature identification code setting interface.
Passage time setting interface Passage record query interface Operator management authority setting interface Linkage function setting Main control function setting Software registration setting Help information setting (operation instructions) Version information.
I won't list them all here.
-
I think the main content of the access control system design scheme should include the following points:
1. Budgeted expenses;
2. Material used;
3. Easy to travel;
4. Rationalization of predictable maintenance;
5. Security**;
Wait, if you need a detailed access control system design plan, you can go to the small wrench e-dimensional network to see, that is a professional security maintenance expert.
-
The access control system adopts a split structure, which is mainly composed of three parts: controller, card reader and lock. Generally includes:
1 Computer.
2 Network switches.
3 Access Controller.
4 Electric plug lock.
5 Read the controller.
6 IC ID Card Reader.
7 Panic button.
8 Access control power box.
9. Other system accessories.
The fourth chapter of Gorky's "Childhood" focuses on three events: his grandmother telling fairy tales for the author, a fire in his home, and his aunt dying in childbirth due to fright. >>>More
The Adventures of Tom Sawyer Chapter 15 Summary:When Tom got home, he hid under the bed so as not to be discovered, so he took the opportunity to overhear the conversation between his aunt and Hubble's mother, and listened to the crying and repenting that he had treated the children so badly, and Tom regretted what he had done now. >>>More
The protagonist in "Robinson Crusoe" - Robinson. He lives tenaciously on this secluded island alone, and there is a voice that keeps echoing in his head: "Give up, what's the point of living like this?" >>>More
Chapter IV. Tonya writes a letter to Tania and confides her thoughts. >>>More
It's very good, our homework is to copy good sentences and paragraphs, which has helped me a lot!!