It uses fingerprint instead of card system for
access. This can be widely used in confidential places for its easy
installation and high security. It's the best choice for you today, to secure
your life tomorrow.
|
Access control system |
BENEFITS OF
ACCESS CONTROL SYSTEM
Track and deter access throughout your organization
Assists in auditing of movement and time and attendance
of staff
Restrict access to sensitive areas
Provide a safer working environment
Remotely administer and control access to multiple
facilities through one interface.
Provides an innovative and superior access control
solution that enables organizations to protect and control assets, properties,
operations and information.
|
access control system |
Biometric accesscontrol uses unique elements of a human body to identify who to grant
access. For example,
door access control
can be done with the use of a fingerprint scanner. First, the authorized finger
prints are scanned and fed into a database.
FEATURES
EmLock
Exit
reader
(L)(U)
Cat-6 Cable
RFID
Cards
Installation
With its open architecture and user
friendly approach, it can be customized to be fully integrated with Time
Attendance & Payroll systems, CCTV camera, Fire alarm system, vehicletracking system, thereby providing an effective and efficient mechanism for
building management.
Access control is a
powerful and flexible functions make it one of the most comprehensive, robust
and efficient access control systems available.
Multi-site, multi-tasking and
multi-user
Visitor management
Card-holder location in real time
HOW RFID WORKS
FOR ACCESS CONTROL
Most access control systems now use a technology called
Radio Frequency Identification or RFID.
RFID technology is combined into contactless smart cards
which people use to identify themselves, and determine whether they should be
able to access a building (or not).
Some of the benefits which RFID offers over the older
technologies, such as magnetic stripe cards, is that there is no contact
required between the reader and the card. This significantly reduces wear and
tear on both the card and reader, requiring much less frequent replacement of
card reader hardware.
However, cards still need to be protected ideally placing
them in a plastic badge holder like the picture below to ensure that the card
is not bent and damaged.
This article will focus on Passive RFID systems where there is no battery source within the card or
credential, as these are more commonly used for access control systems.
HOW DOES IT WORK?
When a card crosses into the field, the power from the RF
field energises an aerial of copper wire looped inside the card body, an
example of which is shown in the image below.
This aerial is also connected to the smart card chip inside
the card.
The aerial powers the chip which contains the card number
and any other data contained on the card, such as unique customer or facility
code.
The
card number is then transmitted back to the reader using part of the RF field
as a transmission method.
The reader will then
send the card number to the accesscontrol system which will make a decision on whether the card holder is
authorized to enter
If you’re looking for guidance on access control, or need help with
choosing the right technology for your project, please contact us on 9581234499(whatsApp
& Wechat) or email: seo@brihaspathi.com