Security Technology Executive

FEB-MAR 2016

Issue link: https://securitytechnologyexecutive.epubxp.com/i/656764

Contents of this Issue

Navigation

Page 58 of 61

February/March 2016 • SECURITY TECHNOLOGY EXECUTIVE 57 www.SecurityInfoWatch.com "Semi-active" means that RF energy 'excites' the transponder and initiates the battery boosted response. This type of operation preserves bat- tery life — an important consideration in all wireless transmission. The vehicle identification system has three modes: continuous transmission of the tag ID (default); activation by user; and random trans- mission of the tag ID. Both reader and tag use a 16-20 bit password which are required to match to result in an output from the reader. The reader reads the encoded data from the tag and trans- mits the data back to the host system, providing an audible and visible LED indication of a prop- erly read tag. Further, each reader in the system operates on a factory-set frequency offset from frequencies being used by other readers in the system, allowing operation of multiple readers in close vicinity of each other without interference. Their "Booster" in-vehicle transponders are a smart combination of transponder and card reader. They read normal access control cards in the vehicle and send both driver information and vehicle information to the reader and from there on to the access control system, thus enabling authorization of both vehicle and driver. One ver- sion supports AES encryption. With technology originally developed for the Autobahn, vehicles can be travelling at speeds up to 125 mph and information is still read, although an employee driving that fast will likely soon be surrendering his credentials! It is worth noting that the capabilities of enhanced security from dual-ID technology and high-speed reads — originally intended for toll road applications — offer rather effective asset tracking when combined. "While we often see the use of RF technology in access control applications, the potential for use lies well beyond that. When properly applied, it can be employed for fleet management, asset tracking, time and attendance, operational effi- ciency enhancements and various other benefits," explains Craig Wilson, Nedap's Marketing Direc- tor. "It really just relies on a solid understanding of the capabilities and limitations of the technol- ogy as applied with creative design." It is clear that wireless technology is growing in today 's security installations. Cer tainly, pro ducts s uch as thes e des er ve the time investment to develop a solid understanding of their capabilities. ■ Ray Coulombe is Founder and Managing Director of SecuritySpecifiers.com and RepsForSecurity.com. Reach him at ray@SecuritySpecifiers.com, through LinkedIn atwww.linkedin.com/in/raycoulombe or on Twitter, @RayCoulombe. Request information: www.SecurityInfoWatch.com/10300750 Two Fabulous Resources Your Security Consultant Connection security NEW! RepsForSecurity info@securityspecifiers.com ¥ info@RepsForSecurity.com Commercial Wireless Comes of Age (continued from page 10) ADVERTISER'S INDEX Advertiser Page SecurityInfoWatch.com/ # AlertEnterprise 15 www.securityinfowatch.com/12139660 Altronix 2 www.securityinfowatch.com/10212790 ASIS International 47 www.securityinfowatch.com/10484004 Canon 7 www.securityinfowatch.com/10213145 Continental Access 60 www.securityinfowatch.com/10213301 Detex 30, 35 www.securityinfowatch.com/10213445 DKS Doorking, Inc. 13, 45 www.securityinfowatch.com/10213482 FLIR Systems, Inc. 39 www.securityinfowatch.com/10213696 G4S 34 www.securityinfowatch.com/10482681 Genetec 3 www.securityinfowatch.com/10213771 HID Global Corporation 9 www.securityinfowatch.com/10213866 Hikvision USA Cover Tip www.securityinfowatch.com/10215768 IDIS 31 www.securityinfowatch.com/10863336 ISC West 2016 55 www.securityinfowatch.com/12147069 Inovonics 41 www.securityinfowatch.com/10213994 Kaba ADS Americas 25 www.securityinfowatch.com/10214145 Mercury Security Corp. 19 www.securityinfowatch.com/10214361 Mission 500 52-53 www.securityinfowatch.com/10487869 PSA Security 51 www.securityinfowatch.com/10214742 Samsung Techwin America 11 www.securityinfowatch.com/10215711 Secured Cities 59 www.securityinfowatch.com/10752984 Security Specifiers 57 www.securityinfowatch.com/10300750 Vanderbilt Industries 21 www.securityinfowatch.com/11514790 University of Phoenix 5 www.securityinfowatch.com/10494636

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2016