摘要:
A reader for an RFID system includes an antenna assembly, a signal driver and a controller. The antenna assembly has an antenna coupled to an antenna tuning circuit which includes a variable capacitance circuit. The signal driver is coupled to the antenna assembly to apply a drive signal to the antenna assembly. The controller is coupled to the antenna assembly to determine a difference between an antenna impedance and a signal driver impedance and to set the variable capacitance at a set capacitance value which reduces the impedance difference.
摘要:
A reader for an RFID system includes an antenna assembly, a signal driver and a controller. The antenna assembly has an antenna coupled to an antenna tuning circuit which includes a variable capacitance circuit. The signal driver is coupled to the antenna assembly to apply a drive signal to the antenna assembly. The controller is coupled to the antenna assembly to determine a difference between an antenna impedance and a signal driver impedance and to set the variable capacitance at a set capacitance value which reduces the impedance difference.
摘要:
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
摘要:
Methods and apparatus for provisioning the use of multiple readers and/or wireless communication protocols within a defined area are provided. More specifically, a coordinator or the like can be used to manage the activation and deactivation of the multiple readers and/or communication protocols within a single reader such that interference between disparate technologies is avoided.
摘要:
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.