Nowadays, RFID access control systems can be seen everywhere in our daily lives. In recent years, the application requirements of high-level important access control systems such as important national departments, financial institutions, and military units have shown a growing trend. Due to the serious security loopholes in the currently widely used RFID access control system, the National Cryptography Administration issued the “Regarding Please Help to Make IC Card System Passwords” to the central and state agencies in accordance with the spirit of the 273rd document in 1998 and national security needs. Letter of Management Work”, the “Notice on Strengthening the Password Management of IC Card System” was issued to the password management departments of all provinces (autonomous regions and municipalities). In April 2009, the “Guidelines for the Application of Key Access Control System Passwords” were issued to the password management departments of all provinces (autonomous regions and municipalities). The transformation and upgrade of important RFID electronic access control systems, and the security of new important RFID access control systems put forward specific requirements, and provided relevant password application methods and method guidelines to meet the security requirements.
RFID is a flexible application technology that is easy to control, simple and practical, and particularly suitable for automatic control. The identification work does not require manual intervention. It can support both read-only working mode and read-write working mode without contact or aiming; Can work freely in a variety of harsh environments: short-distance radio frequency products are not afraid of oil stains, dust pollution and other harsh environments, and can replace bar codes, such as tracking objects on the assembly line of a factory; long-distance radio frequency products are mostly used in traffic, and the identification distance can be Up to tens of meters, such as automatic toll collection or vehicle identification. Its unique advantages are beyond the reach of other identification technologies. There are mainly the following aspects:
Convenient and fast reading: Data reading does not require a light source, and can even be carried out through the outer packaging. The effective identification distance is larger, when the active tag with its own battery is used, the effective identification distance can reach more than 30 meters;
Fast recognition speed: as soon as the tag enters the magnetic field, the reader can read the information in it instantly, and can process multiple tags at the same time to achieve batch recognition;
Large data capacity: The two-dimensional barcode (PDF417) with the largest data capacity can only store up to 2725 numbers; if it contains letters, the storage capacity will be less; RFID tags can be expanded to dozens of K according to the needs of users;
Long service life and wide application range: its radio communication method allows it to be used in dust, oil and other highly polluted environments and radioactive environments, and its closed packaging makes its lifespan much longer than printed bar codes;
The label data can be changed dynamically: the programmer can write data to the RFID label, which gives the RFID label an interactive portable data file function, and the writing time is less than that of printing a bar code;
Better security: It can not only be embedded or attached to products of different shapes and types, but also can set password protection for the reading and writing of label data, thus having higher security;
Dynamic real-time communication: The tag communicates with the reader at a frequency of 50-100 times per second, so as long as the object attached to the RFID tag appears within the effective recognition range of the reader, its position can be dynamically tracked and monitored .
The principle of the rfid smart lock is that the reader emits a specific frequency of infinite radio wave energy to the Transponder, which is used to drive the Transponder circuit to send the internal ID Code, and then the Reader will receive the ID Code. Seven characteristics of electronic tag RFID compared with barcode 1. Fast scanning. Only one barcode can be scanned at a time.
The basic working principle of RFID technology is not complicated. After the tag enters the magnetic field emitted by the reader, it receives the radio frequency signal from the reader, and uses the energy obtained by the induced current to send the product information stored in the chip (PassiveTag, passive tag or passive tag), or actively send a certain frequency The signal (ActiveTag, active tag or active tag); after the reader reads and decodes the information, it is sent to the information processing center of the system for relevant data processing.
RFID Cabinet Lock
RFID door lock system
Commercial RFID door lock system
RFID lock system for hotel
RFID lock for gun Cabinet
RFID door lock system business