Card reader for access control system and working method thereof

A technology of access control system and working method, which is applied in the direction of reading instruments, time registers, memory record carriers, etc., can solve the problems of not having the function of preventing IC card copying, obtaining card number capacity limitations, and burning equipment, etc., to achieve a long-term solution The problem of unstable power supply from a distance, the improvement of the voltage input range, and the effect of eliminating the behavior of cloning tags

Pending Publication Date: 2017-08-25
广东宏大欣电子科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This read-only operation does not have any encryption method, which makes the card number unique, does not have the anti-IC card copy function and other factors, and is easy to be cloned by others, resulting in a decrease in security and seriously affecting the security of the access control system.
Moreover, the current communication protocols used by access control card readers only support Wiegand 26 and Wiegand 34 formats, and the capacity for obtaining card numbers is limited
At the same time, access control card reader products can only work normally within the power supply voltage range of 9-12V
Its working range will be limited to a certain extent. Assuming that the same power supply supplies power to multiple card readers, if the short-distance card readers are to work normally, the power supply voltage must be controlled between 9-12V. It cannot meet the normal working conditions of the long-distance card reader; if the long-distance card reader is to work normally, the power supply voltage must be increased. If it exceeds the maximum voltage withstand capacity of the short-distance card reader, the Card reader burnt at close range
In addition, since the current access control card reader products do not have the high voltage protection function
Assume that during the installation or maintenance of the card reader, the technician’s operation makes the interface of the card reader mistakenly touch other high-voltage contacts or other mistakes lead to wrong wiring and burn the equipment, which will cause certain difficulties for the installation project and future maintenance work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Card reader for access control system and working method thereof
  • Card reader for access control system and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment discloses a card reader for an access control system, the block diagram of which is attached figure 1 As shown, it specifically includes: MCU module, RFID radio frequency module, buzzer module, pin protection module, LED module, power supply module, antenna module, wherein, the MCU module and the RFID radio frequency module, the buzzer The device module, the pin protection module and the LED module are connected, and the instructions issued by the RFID radio frequency module, the buzzer module, the pin protection module and the LED module are managed, and at the same time, receiving The feedback information of the power supply module, the RFID radio frequency module and the pin protection module.

[0034] The power supply module supplies power to the connected MCU module, the RFID radio frequency module, the buzzer module and the LED module respectively.

[0035] The buzzer module is used for prompting and alarming when the card reader swipes a card.

...

Embodiment 2

[0045] This embodiment discloses a working method of a card reader in an access control system, the flow chart of which is shown in the attached figure 2 As shown, it specifically includes the following steps:

[0046] The RFID radio frequency module emits a specific frequency radio wave energy to generate a magnetic field;

[0047] When the access control card enters the magnetic field, it receives the radio frequency signal sent by the card reader, and the energy obtained by the induced current drives the card circuit to send out the product information stored in the access control card chip;

[0048] After receiving the product information of the access control card, the RFID radio frequency module feeds back to the MCU module, calculates the password of sector I, reads the content of the sector, calculates the password of sector II again, reads the content of the sector, and calculates the card number of the access control card;

[0049]The MCU module judges whether the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a card reader for an access control system and a working method thereof. The card reader comprises a power module which supports 4.5-15V wide voltage input scope and can solve the problem of unstable long-distance power supply of the card reader; the card reader comprises a MCU module which has a dual encryption algorithm; after a physical card number is acquired by the card reader, the card reader calculates a password of a fan zone I, reads the content of the fan zone, calculates a password of a fan zone II again and then reads the fan zone content and calculates the card number, so that the safety of the access control system is promoted; the card reader comprises a pin protecting module; a pin input end has a high-voltage protection function and can prevent the elements from being burned if a worker mistakenly connects wires or gets electric shock by mistakenly touching high voltage in the mounting process. The card reader for the access control system not only can read cards but also can write cards, supports various communication transmission protocols of Wiegand 26, Wiegand 34 and Wiegand 44 simultaneously, has an increased capacity for acquiring card numbers, can prevent IC card copying function and can effectively eliminate the label cloning behavior.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to a card reader for an access control system and a working method thereof. Background technique [0002] At present, the access control system card reader products on the market only support the reading operation of the card, and do not have the writing operation function. This read-only operation does not have any encryption method, which makes the card number unique, does not have the anti-IC card copy function and other factors, and is easy to be cloned by others, resulting in a decrease in security and seriously affecting the security of the access control system. Moreover, the current communication protocols used by access control card readers only support Wiegand 26 and Wiegand 34 formats, and the capacity for obtaining card numbers is limited. At the same time, access control card reader products can only work normally within the power supply voltage range of 9-12V. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K7/00
CPCG06K7/0008G07C9/23
Inventor 钟漍标廖运岳徐连英
Owner 广东宏大欣电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products