Basic definition of access control card The original smart access control system consists of a host, a card reader and an electric lock (add a computer and a communication converter when connected to the network). The card reader is a non-contact card reading method, and the card holder can only put the card in the reader The Mifare card reader can sense that there is a card and lead the information (card number) in the card to the host. The host first checks the illegality of the card, and then decides whether to close the door. All processes can achieve access control management functions as long as they are within the scope of valid card swiping. The card reader is installed in the wall beside the door, which does not affect other work. And through the communication adapter (RS485) and the computer for real-time monitoring (all doors can be opened/closed by computer commands, and the status of all doors can be viewed in real time), data resolution, inquiry, report input, etc.
The access card is a card used in the access control system, such as pass, access card, parking card, membership card, etc.; before the access card is issued to the end user, it is set by the system administrator to determine the usable area and user rights, and the user can use it The access control card is swiped to enter the management area, and users who have no access control card or have not been authorized cannot enter the management area.
With the continuous strengthening of corporate management awareness, management models based on the use of cards are becoming more widespread. Barcode cards, magnetic stripe cards, and contact ID cards, as forms of patrol, access control, expense, parking, club management, etc., perform their unique roles outside the management of smart communities. However, as the performance of card management has been stagnant, because the limitations of traditional card functions cannot meet the needs of the all-in-one card, it is necessary to add cards to the owner from time to time to meet the needs of property management, such as access cards, production cards, access control cards, Parking cards, membership cards, etc., not only increase management costs, but also increase the difficulty for each owner to manage everyone’s cards, sometimes even ”too many cards”. Therefore, in the phase-out, after 2010, mainstream card types should be It belongs to Mifare card, but the development of CPU card is also very fast, which is a trend. Mifare card and access Control RFID Key chains has a wide range of applications. On the one hand, its security is high; on the other hand, it brings convenience to the all-in-one card. Field, consumption, attendance, patrol, intelligent channel, etc. are integrated into one system, and the functions of the all-in-one card can be realized without networking.
The principle is because there is a chip called RFID inside. When we pass the card reader with the card containing the RFID chip, the electromagnetic waves emitted by the card reader will start to read the information in the card. The information inside is not only It can be read, and it can also be written and modified. Therefore, the chip card is not only a key, but also an electronic ID card or access Control RFID Key chains.
Because as long as you write your personal data in the chip, you can know who is going in and out at the card reader.
The same technology is also used in anti-theft chips in shopping malls and so on.
There are many types of access control cards, which can be divided into several categories according to the selected materials. Examples of classification of finished access control cards:
According to the shape
According to the shape, it is divided into standard cards and special-shaped cards. The standard card is an internationally uniform size card product, and its size is 85.5mm×54mm×0.76mm. Nowadays, printing is not limited by size due to individual needs, which has led to the appearance of many ”weird” cards of all kinds in countries all over the world. We call this type of card special-shaped cards.
By card type
a) Magnetic card (ID card): The advantage is low cost; one card per person, general security, can be connected to a computer, and has door opening records. The disadvantage is that the card, the equipment is worn, and the life is short; the card is easy to copy; it is not easy to control two-way. Card information is easily lost due to external magnetic fields, making the card invalid.
b) Radio frequency card (IC card): The advantage is that the card has no contact with the device, opening the door is convenient and safe; long life, theoretical data at least ten years; high security, can be connected to a computer, with door opening record; can achieve two-way control; the card is difficult Is copied. The disadvantage is that the cost is higher.
According to the reading distance
1. Contact-type access control card, the access control card must be in contact with the access control card reader to complete the task.
2, Inductive access control card, the access control card can complete the task of swiping the card within the sensing range of the access control system
Access control cards are mainly the following types of cards: EM4200 card, Access Control RFID
Keyfobs,Mifare card, TM card, CPU card and so on. Currently, EM 4200 cards and Mifare cards occupy almost all of the access control card application market. Therefore, when we choose the application card, it is best to choose EM card or Mifare card as our main card. Because for other cards that are not commonly used, whether it is the maturity of the technology or the matching of accessories, it will bring us a lot of trouble. And with the shrinking market share, these cards will inevitably not gradually withdraw from our application market after a period of time. In this case, the repair, expansion, and transformation of the access control system will bring unexpected troubles.
In fact, for ordinary access control applications, the EM card is undoubtedly the most practical type of access control card. It is characterized by long card reading distance, high market share, and relatively mature technical practice. But the biggest disadvantage of this type of card is that it is only a read-only card. If we are at the gate and need some charging or transaction functions, then this kind of card is really a little powerless.
For users with consumption management needs, if some simple records or transfers are required, then the Mifare card is sufficient. Of course, if we still need some more detailed content identification or transaction activities in the application of the access control system, then the CPU card supported by the latest technology has stronger security than the traditional Mifare card. In the long run, CPU cards are increasingly eroding the Mifare card market.
Post time: Jun-19-2021