Electronic Key Card Systems

What are Electronic Key Card Systems

Electronic key card systems are a simple approach to get your employees easily and securely into and from their offices. There are several choices to select from when it occurs to keyless entry management.

In this extensive manual for card readers, we describe the many key card types and fob entry systems, what are the pros and drawbacks for card access, what variables are involved in lock prices for key card lockers, and how you may select for your business the best door access protection solution such as Union Alarm.

What’s the door to the key card?

You have undoubtedly seen or used them in the past – a plastic card, ID badge, or any other electronic keycard to open a door or into a building, swiping in front of a scanner. For several years now, key card access control systems are in place, and this is a fairly common technique of security for enterprises worldwide.

Currently, key card and fob door access systems are utilized for parking garages, multi-placement office buildings, communal amenity communities, and big business bureau with limited access to certain sections.


Electronic Key Card Systems

Understanding electronic keycards

All doors get entry to control structures work similarly. Credentials are presented to a reader, which sends the information to a controller for authentication. If the credentials suit a fixed stored at the device’s whitelist, the controller unlocks the door and usually sends a sign to the reader, too. Credentials can range, but key playing cards are easily the most common because they’re cheap to manufacture, clean to at ease, simple to software, and easy to manipulate. Most key cards are made from skinny, bendy plastic with chips and/or magnets embedded in them, making them extremely fragile. If you’re concerned about an employee’s detrimental credentials, you might need to apply heavy-responsibility playing cards or plastic instances to save them from bending.

How do the access control systems for card reading operate

A card reader system for door entry gives peace of mind by checking who is able to enter and what time. In instruction for card reader entrance systems to work, three essential components are required: a door safety card, a door card reader, and a door lock.

The door is unlocked by electrical and magnetic card door locking, proximity activation or a punch card. When the access monitor card system recognizes the key-card license on the door card reader and allows it to release the signal to the magnetic door lock.

The door locking mechanism of the magnetic card then enables the user to open the door using the push bar, lever, or lock. Once the user closes the door behind them, door locks are spontaneously secured in the door magnetic card, ensuring that the door after every entry is closed securely.

Automatic key card door lock systems may be activated by taps of the door card reader nearby or by punching a card through the reader, depending on the kind of card reader entry placed in the building. Various door card reader practices additionally enable the use of a smartphone app to support mobile unlocking.

RFID cards and RFID fobs Proximity cards

This access technique employs RFID to transfer data gathered within the card to a performer, some of the most widely utilized forms of security key card information. Varying on your requirements and the sort of security entry you choose, RFID-enabled key cards and key fob techniques can be operated at various ranges. Typically, the card has to be quite close to the player to transfer data with vicinity cards and RFID key fobs.

Wiegand cards

A number of the primary key cards that evolved for a key card gadget were Wiegand cards, named after their inventor. In the 1970s, John R. Wiegand noted that particularly annealed wire made from iron, cobalt, and vanadium will all of sudden transfer polarity while passed via a sufficiently strong magnetic area. A close-by sensor coil will pick up the fast change as a high-voltage pulse, which can be translated into records if more than one wire is pulled through the sphere. A Wiegand key card uses parallel traces of brief Wiegand wires to store binary information in magnetic polarity. whilst the card is pulled through the reader, the wires sign in as ones and clean spots check in as zeroes. The precise Wiegand range is then sent to the controller to be authenticated.

By way of nature, Wiegand cards can not be erased or reprogrammed by using magnetic fields. They’re also more durable than different styles of key playing cards because they don’t contain a microchip or different breakable additives. While Wiegand playing cards themselves are hardly ever used outside of legacy structures today, the Wiegand protocol is still the usual interface to attach readers and scanners to controllers, regardless of what kind of credentials are used. From other sorts of key card structures to fingerprint scanners, maximum readers convert the statistics to a Wiegand variety

Swipe cards

Making use of the equal technology located in a credit card, magnetic stripe cards are swiped throughout a magnetic reader to transfer facts. When swiped, the magnets create various voltages throughout a magnetic study head that measures the converting voltage and converts it to a binary credential. Magnetic fields can damage the facts stripe, which results in losing your credentials even if you still have your card.

Contactless credentials normally use Radio Frequency identification to transmit statistics saved on a microchip. Prox playing cards use a low frequency of one hundred twenty-five kHz to speak with the reader. The card can either be actively powered with the aid of a small lithium battery or, greater normally, passively powered by using the reader, which continuously sends out a short-variety radio sign. Prox cards are proprietary, so there aren’t any mounted standards or compatibility between producers. They’re additionally relatively liable to being copied or rewritten, even though you’d be in the card’s study radius (about 1 foot) to achieve this.

Cost Analysis for Card Systems

A security system is an important venture for any company, and it is usually a top worry how considerably your access monitoring system costs. When you build an entrance control plan your ultimate cost depends on how many readers and control panels you require, the sort of hardware you pick, and the system’s credentials. A key card entrance reader approach might appear to be the cheaper choice in the front.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top