Access Control Systems
Most of the cards used in access control systems (ACS) - contain a fixed identification number, which is “stitched” at the factory and is available only for reading. With the use of smart cards, you can use both its serial number and data recorded in the non-volatile area. The organization of access control systems based on contactless smart cards allows you to increase the level of security of the system, virtually eliminating the possibility of card falsification. Rewritable cards exist with both open protocol and cryptography. Entering a new code into the crypto-protected area can be accomplished with the help of a special utility, and, further, the reader, which is also transferred to the operation mode with crypto-protected areas, will only apply to this area to read the code. In this area you can bring any combination of numbers and letters. To change the access codes to the protected area and enter them into the readers, a special master card is created (also with the help of the utility), after which you can use the computer to issue cards with new keys. When working with such cards and readers, you can change the access codes in the system even daily.
Counterfeit protection
It is no secret that any expensive and mass production causes a huge temptation to fake in order to obtain super-profits from the sale of such counterfeit products. For example, you can take the issue of alcoholic beverages. Placing labels on each product during production at the factory allows not only to protect the manufactured goods, but also to trace the product’s path to the final consumer. Putting a label on each product during the reception of goods, for example, in a wholesale store, allows you to verify the authenticity of the information indicated on the product box (date, place of manufacture, etc.). The data from the tags gets to the reader, which in turn sends them to a computer on which special software is installed. The obtained information is analyzed and compared with the data available in the database. When using contactless tags, this process does not take much time, since the reader receives information from several tags at once (provided that the system provides the anti-collision mechanism). If in the process of reading tags there is a discrepancy in the data, then it will not be difficult to find this product when using a scanner that reads up to several dozen marks at a time in tens of centimeters. Physical removal of the label from the product leads to its further unsuitability, therefore, the labeling of the label from one bottle to another is impossible.
Automatic vehicle identification system
The automatic identification system (ASI) of transport is organized on the basis of radio frequency contactless RFID tags.
The system is designed for automatic or automated vehicle identification when driving through a control point.
The system solves the following tasks:
Identification of transport in motion over long distances (from 2 to 30m).
Fully automatic registration of transport (without human participation in the identification process).
Simultaneous identification of several objects in the transport stream.