Abstract:
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interface enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Abstract:
Methods and systems are provided for an RFID system that can be tuned dynamically and/or in real-time during a coupling event between a reader and a transponder. The reader can comprise an antenna assembly, a signal driver, and a controller. The antenna assembly may include a tuning circuit and an antenna coupled to the tuning circuit. The tuning circuit can include registers that may be set to adjust one or more characteristics of the reader. A controller is coupled to the antenna assembly to determine characteristics of the received signal and to set hardware or firmware functions that improve the coupling of the reader and transponder and/or improve the reception of the signal(s) from the transponder.
Abstract:
Methods and systems are provided for an RFID system that can be tuned dynamically and/or in real-time during a coupling event between a reader and a transponder. The reader can comprise an antenna assembly, a signal driver, and a controller. The antenna assembly may include a tuning circuit and an antenna coupled to the tuning circuit. The tuning circuit can include registers that may be set to adjust one or more characteristics of the reader. A controller is coupled to the antenna assembly to determine characteristics of the received signal and to set hardware or firmware functions that improve the coupling of the reader and transponder and/or improve the reception of the signal(s) from the transponder.
Abstract:
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interface enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Abstract:
Readers are associated with a number of access credentials and, once authenticated by the reader, may grant the holder of the access credential access to a secured asset. Readers may become the target of attack, such as when an unauthorized party attempts to gain access to the interior of the reader or removes the reader from an installed location. Once removed the reader may be reinstalled in another location or a counterfeit reader used in its place. By providing a paired tamper credential, the reader may deny otherwise authorized access to the secured asset if the tamper credential fails to respond appropriately. The tamper credential may fail to respond due to distance, such as when the reader alone is relocated, or the tamper credential is damaged, such as during an attempt to gain access the interior of the reader and/or remove the reader from its installed location.
Abstract:
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Abstract:
An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interface enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.
Abstract:
A universal mounting ring has an arcuate or curved upper portion and a plurality of downwardly depending tabs. The universal mounting ring is configured to interface with an electrical enclosure, such as conventional electrical junction boxes to permit a radio frequency identification (RFID) reader to be secured within the enclosure and mate with a wide variety of enclosure cover assemblies manufactured by third parties. The downwardly depending mounting tabs are provided with multiple mounting positions such that the reader may be securely mounted at a plurality of positions relative to a cover assembly.
Abstract:
An anti-passback algorithm for an access control system is described. The anti-passback algorithm prevents the use of valid credentials to gain access to an access-controlled area by more than one person within a given period of time. The algorithm is capable of distinguishing between credentials intentionally presented to the access control system and credentials that are unintentionally read by the access control system. Certain variables may be set by the access control system manufacturer or a trusted individual to adapt the algorithm for applications.