Chinaunix首页 | 论坛 | 博客
  • 博客访问: 296567
  • 博文数量: 334
  • 博客积分: 0
  • 博客等级: 民兵
  • 技术积分: 3540
  • 用 户 组: 普通用户
  • 注册时间: 2013-05-01 10:43
文章分类

全部博文(334)

文章存档

2014年(218)

2013年(116)

我的朋友

分类: PHP

2014-05-29 11:16:31

In trying to improve security level of many establishments, access control systems are employed. It requires employees who want to access secure areas of buildings to use proximity cards in order to gain approval.

Organizations are commonly using access control systems which require employees to access secure areas of buildings by using proximity cards to gain approval. The proximity card is provided to each employee and it contains a unique identifier that is read by a card reader and transmitted to the access control software in the central computer. The internal database that is housed in the computer where the software resides is the guide that the access control software uses to allow access or deny the request.

Proximity cards are contactless integrated circuit devices. The cards are often called proximity cards or smart cards. A popular brand is made by HID, hence the name HID prox card. These cards provide access control to secure facilities, personal computers, computer networks and other restricted areas that can be controlled by the access system.

In a unique custom ID, the information is able to be read by the computer after it is transmitted by the card-reader to the software capable or reading the interpreting the information. Sometimes a password is required in combination of swiping a smart card to verify the authentication of the user. The card-reader extracts the information available in the prox card when it is swiped.

Some smart cards must make direct contact with the card reader for transmission to occur. Other readers can extract the information when the card is held close to the reader. Contact is not required for this transmission.

Proximity cards are able to be used on card readers located on a personal computer, inside or outside a door, on computer systems or other areas that a company requires limited access. The reader can run off or a power source, a 12 volt, 24 volt or USB power supply.

Once the information is transmitted to the computer software, the software begins analyzing the database on file for the card holder's information. Once it is located, the software scans the database for additional specific information that would allow or deny access. If approved, the software is capable of sending an electronic message to the locked item and it is opened for the card holder to enter. If not approved, some systems do not return any response, while others will issue a denial.

阅读(441) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~