Access Control Systems

Engineered Solutions specializes in Custom Access Control Solutions.

The purpose of access control is to grant entrance to a building, office or S/W application only to those who are authorized to be there.

The deadbolt lock, along with its matching brass key, was the gold standard of access control for many years; however, modern businesses want more.

Yes, they want to control who passes through their doors, but they also want a way to monitor and manage access.

Keys have now passed the baton to computer-based electronic access control systems that provide quick, convenient access to authorized persons while denying access to unauthorized ones.

Access to Software Applications may also need to be restricted to access control.

Metro Card Access Control

Specializing in Internet/WEB/Cloud based solutions featuring HID Readers and ProxCards/SmartCards

access control systems
31mwt-Jx4zL

Smart Cards in Access Control – Overview

A smart card is a typical plastic card that contains an embedded computer chip which is either a memory or a microprocessor type. The data that the chip is responsible for storing and transmitting pertains to either value, information or a combination of both. This data is both stored and processed within the card’s chip. The card data is transmitted via a reader, which is the outward facing component of the smart card security computing system. Several systems across a wide range of commercial sectors, like banking, healthcare, finance, entertainment, and media nowadays use smart card security systems in their applications. Applications using smart cards benefit from the several security features that these chip cards provide. The efficiency of the systems is elevated to a large extent due to the smart cards.

RFID in Access Control Management System

The most common use of an RFID system is in access control and door entry systems for personnel. The basic principle upon which RFID tags are employed is the identification badge of the workers of any company or industry. The RFID applications for personnel identification uses normally quite low frequency, at 125 KHz, for badge detection. This means that the RFID access card will have a chip that transmits at 125KHz, and the RFID reader will be able to interpret radio waves at a frequency of 125KHz.

Let’s take a deeper dive to understand how RFID technology works in access control systems. An RFID system is composed of the following main components:

  • The RFID Card or Tag
  • The RFID Reader
  • Card Access Management Software
  • Access Control Panel
RFID Card / Tag

RFID cards contain an RFID chip. The RFID chip contains an antenna coil that receives electromagnetic radiation from the active RFID reader, which in turn creates a current that activates the RFID card’s chip. This will communicate with the other device in the RFID system, generally the RFID reader, and will transmit the relevant authentication information.

RFID Door Reader

The RFID reader has an antenna which sends the radio waves to detect any RFID tag or card within its range. This range can vary for the RFID readers depending upon the frequency of emitted radio waves. When contact is established with an RFID smart card, a system is created, and the door reader prompts the card to transmit its authentication information, as described above.

The RFID reader decodes the uniquely stored information in the RFID card/tag. Then, based on the way that the RFID system is set up, it will generally transmit the information either through ethernet wiring or WiFi connectivity to a central hub, which will manage the rest of the processing of the information.

Our solutions feature detailed Management Reporting as well as Locked-Down Graphical Interfaces for maximum security.