Organizations typically use an access control system that requires employees to access the secure area of the building by using proximity cards for approval. Proximity cards are assigned to each employee and contain unique identifiers read by the card reader and sent to the access control software on the central computer. The internal data base stored on the computer on which the software is located is a guide used by the access control software to allow access or deny requests.
Proximity card is an integrated circuitless device without contact. These cards are often called proximity cards or smart cards. The popular brand is made by HID, hence the name of prox card HID. These cards provide access control to secure facilities, personal computers, computer networks and other restricted areas that can be controlled by the access system.
In a unique custom ID, information can be read by a computer after it is sent by a card reader to a capable software or read interpreting information. Sometimes a password is required in a combination of smart card swiping to verify user authentication. The card reader extracts the information available on the prox card when swiped.
Some smart cards must make direct contact with the card reader for transmission proximate analyzer indonesia to occur. Other readers can extract information when the card is kept close to the reader. Contact is not required for this transmission.
Proximity cards can be used on card readers located on personal computers, inside or outside the door, on computer systems or other areas requiring companies to have limited access. Readers can run or resources, 12 volts, 24 volt or USB power supply.
Once the information is sent to the computer software, the software starts analyzing the database on file for cardholder information. Once found, the software will scan the database for additional special information that will allow or deny access. If approved, the software is capable of sending electronic messages to locked and unlocked items for incoming card holders. If not approved, some systems do not return any response, while others will issue rejection.
Komentar
Posting Komentar