Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 13 –ID Card Access Control.

Slides:



Advertisements
Similar presentations
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 4.1 Chapter 4.
Advertisements

JAIPUR 16 DEC 08 TECHNOLOGY FOR FINANCIAL INCLUSION Indian Institute of Banking & Finance N D RAO.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Copyright©2000 by Houghton Mifflin Company. All rights reserved. 1 QUESTION.
7 - 1 Copyright © 2009 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Return, Risk, and the Security Market Line Chapter Thirteen.
Smart Cards. ISO/IEC Basic Overview Clock Frequency: MHz Load Frequency: kHz Modulation Card:AM/NRZ Modulation Reader:BPSK Data Rate:106.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 21 – Control Panel Managers.
FPGA based RFID Reader Group Members – Farhan Tariq Usman Sarwar Khalid Khan Supervisor- Mr. Naveed Ahmed Internal Advisor- Prof. Dr. Abdul Razzak Memon.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RFID Types Passive RFID – No batteries required – Weaker – Cheaper Active RFID – Battery powered – More complex – Expensive Three Main Types of Frequencies.
by Barb Philipak 2002 Plank Road Publishing, Inc. International Copyright Secured * All Rights Reserved ©
The Study of E-payment System Using Smart Card Computer Security & Electronic Payment System - Cheong Je-ho - Song Jae-il - Shin Heung-Soon -
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
1 copyright © Creative Smarts Inc. GregTangMath.com October 21, 2015 GregTangMath.com
Radio Frequency Identification (RFID)
1 Chapter 33 - Sodium and Chloride Transport: Proximal Nephron Copyright © 2013 Elsevier Inc. All rights reserved.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. Example 1-Ad A.
Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Automating and Integrating Residential Systems Presentation 7 – Closed Loop Control.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Magnetism and Work.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 18 – Wireless Security.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 39 – Laptop Components.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 3 – Motion Detection.
Waves Copyright© 2015 EducAide Software Inc. All rights reserved.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 5 – The HAI Omni II Controller.
Residential Audio & Video Systems Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 3 – Using the Multimeter.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 4 – Secure Installation.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 21 – The Computer Mouse.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 7 – Divide and Conquer.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 2 – The Properties of Light.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 19 – Multi- Camera Systems.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 16 – The Camera Lens.
TECHNOLOGY FOR FINANCIAL INCLUSION
How Things Work: Smart Cards Ian McConkey November 2, 2017
PowerPoint Presentations
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
Section 2.5 Graphing Techniques; Transformations
The Inverse Trigonometric Functions (Continued)
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Bengt Oelmann Mitthögskolan, ITE
Copyright © 2012, Elsevier Inc. All rights Reserved.
Section 10.1 Polar Coordinates
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2014, 2000, 1992 Elsevier Inc. All rights reserved.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Section R.2 Algebra Essentials
Section 10.5 The Dot Product
Modeling Functionality with Use Cases
Unit 4 Review Answers.
Copyright © 2012, Elsevier Inc. All rights Reserved.
IntroductionMolecular Structure and Reactivity
Forms.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Presentation transcript:

Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 13 –ID Card Access Control

2 Objectives At the end of this presentation, you will be able to:

3 Explain the difference between contact and contactless access cards. Explain the difference between the two types of smart access cards. List the three contactless standards that support access card control.

4 Contact Access Cards Barcode Magnetic stripe Smart chip

5 Card with Barcode

6 Card with Magnetic Stripe

7 Card with Smart Chip (Smart Card)

8 ISO/IEC Standards for Smart Cards ISO/IEC 7816 Contact IC Cards ISO/IEC Close-Coupled Cards ISO/IEC Proximity Cards ISO/IEC Vicinity Cards

9 Contactless Access Cards 125 kHz (RFID or close-coupled) Proximity Vicinity Hybrid

kHz Smart Card (RFID or Close-Coupled) 125 kHz IC Chip Antenna

11 Proximity Smart Card MHz IC Chip Antenna

12 Vicinity Smart Card MHz IC Chip Antenna

13 Hybrid Smart Card MHz IC Chip Antenna Smart Chip

14 Hybrid Smart Card MHz IC Chip 125 kHz IC Chip Antenna

Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved End