RFID Reader

Startseite » Industrial PC » Industrial pc extensions » Industrial pc extensions RFID reader
RFID Reader Table Front

RFID readers are suitable for many areas of application, because many companies have systems and machines that can only be operated by specially trained employees. PLC controls that only masters can program. Technical rooms or laboratories, access to which is reserved for authorized persons.

These and many other authorization cases can now be mapped locally, including subsequent actions - completely independent of higher-level systems.

RFID (Radio Frequency Identification) is a variant of the AutoID. Auto ID means automatic identification and data collection, also called automatic identification (auto ID). This includes technologies such as barcodes, smart labels, biometrics, OCR, etc.

With RFID technology, a transponder (tag), a reader for reading the transponder information and software with interfaces to EDP systems and databases.

The main advantage of RFID lies in the completely contactless transmission of the massively increased amount of information. RFID readers need neither physical nor visual contact and can recognize a large number of transponders simultaneously (or in a very short time) (bulk recognition).

Despite the large amount of information, most transponders (depending on the frequency) do not need their own energy supply and are often rewritable.

With RFID solutions, we differentiate between two basic functionalities for data transmission.
Inductive coupling (125KHz to 13.56MHz)
- short reading distances
- slow data transfer rates
- Iron problems

Transponder for this area at 125KHz
Range: up to 30cm
Good qualities in difficult environments
Low data transfer rates
Expensive tags
No anti-collision

Transponder for this range with 13.56 MHz (HF)
Range: up to 150cm
Good qualities in difficult environments
difficulties with metal
Anticollision for 10-40 tags per second

Elektromagnetic coupling (400MHz to 6.8GHz)
- largeß< span style="font-family: Arial, Helvetica, sans-serif;">e Reading distances
- gro
ße data transfer rates
- Liquids interfere with transmissions

Transponder for this area with 867-869MHz, 902-928MHz (UHF)
Range: up to 3m
Good properties in difficult environments, even with metal
High data transfer rate
Anticollision for 50 tags per second
Many standards

2.45GHz (passive )
Range: up to 150cm
Poor qualities in difficult environments
Goes well with metal
Anticollision for 50 tags per second

In connection with the PANEL PC and industrial computer systems manufactured by FORSIS, however, there is personal data in the foreground. That means we are moving in the area of inductive coupling of the transponders. Below are examples of possible uses:

  • Access control / time recording
  • Payment / Vending
  • copier / printer
  • Phone
  • Library
  • IT access
  • Local transport ticket
  • Fleet management / refueling

LEGIC Advant

Legic uses the principle of dynamic memory segmentation for this. Up to 127 segments for different applications can be applied to a Legic medium. The reader selects the correct segment dynamically using search strings or statically using the segment number.

The encryption (Legic, DES, 3DES, AES, depending on the transponder type) can configured individually for each segment.

Key management for readers and ID cards is carried out using master cards (Master-Token System-Control , MTSC). Possession of these cards determines the authorization to create segments and grant readers access to protected segments.

Legic media does not have a central application management mechanism. New segments can always be created as long as there is enough free memory, and segments can be deleted - always provided the right master card is used.

The data structure of the MIFARE DESFire transponders is set up by NXP, the manufacturer, as a "flexible file system". Up to 28 applications can be created on a DESFire EV1 transponder.

Each application is given a unique application ID, which the reader uses to select "his" application. Up to 32 files can be created within each of these applications, and the size of the files can be freely defined.

Depending on their use, the files can be created as standard, backup, value or record files. Up to 14 different keys can be defined per application, writing and reading rights for each file are flexibly linked to this set of keys. The algorithms DES, 3DES and AES are supported. Central application management has been implemented on Desfire transponders. The issuer can use a card master key and the associated key settings to determine the conditions under which new applications can later be created or deleted.

For creating working DESFire applications and configuring the readers is the knowledge of required keys necessary. An exception to this rule are the MIFARE SAM AV2 modules, with the help of which keys are stored in secure hardware (processor chip module) and, for example in SIM card format, can be integrated into additional slots of the card reader - a clear plus in security that however, this is bought at a higher cost.

RFID reader with USB or serial interface

Especially in cases where If, in addition to FORSIS industrial PCs, "normal PCs or thin clients" are also used, it is necessary to equip these devices with the same RFID reader, if possible.


The advantages are the
as exactly the same reading method and the identical Interface connection. Thus also the standardized data feed into the application at all recording stations, as well as dthe homogeneous RFID technologies and last but not least dThe flexible mounting of the reader, because it can be used as a table, wall or or mounting variant (landscape format).

RFID Reader via LAN or WLAN as an alternative to USB

As an alternative to the USB reader, it is also possible to use the RFID reader via LAN or Run WLAN as a network-capable reader. Instead of the direct assignment of the reader to the data acquisition device, the reader communicates as a terminal device via TCP/IP and can send transactions to any IP address, which then enable release or other actions.

Local sanity check and Sharing as another option

For both reader variants, the next one was Development step that the reader is able to decide about simple things himself. Previously, the plausibility check was always carried out by higher-level systems. Ultimately, the task of an RFID reader is always the ID number. capture and then pass it on for testing. However, if he carries out the check himself by comparing it with locally stored ID card data, there can be an immediate reaction. Start of a transaction and/or local control.

Input and Output signals

The FORSIS RFID Reader is equipped with two digital outputs for direct actions and two digital inputs for verification of execution or monitoring.

With the help of simple software, ID card numbers can be transmitted to the reader, which are stored in the reader remain. Certain attributes can be given to these ID cards, such as Digital Out 1, 2, transaction and much more.

distribution
Our sales team is happy to be there for you personally!
RFID Reader Food

RFID reader with USB or serial interface

Especially in cases where "normal PCs" or "thin clients" are used in addition to FORSIS industrial PCs, it is necessary to equip these devices with an RFID reader, if possible the same .
The advantages are:

  • Exactly the same reading method and the identical interface connection
  • Thus the standardized data feed into the application at all recording stations
  • The homogeneous RFID techniques
  • The flexible attachment of the reader, because it can be used as a table, wall or mounting variant (landscape)
RFID Reader Front

RFID reader via LAN or WLAN

As an alternative to USB, it is also possible to run the RFID reader as a network-capable reader via LAN or WLAN. Instead of the direct assignment of the reader to the data acquisition device, the reader communicates as a terminal device via TCP/IP and can send transactions to any IP address, which then enable release or other actions.

Edelstahl Terminal Rfid Min

Local sanity check and approval

With both reader variants, the next development step was that the reader is able to decide about simple things himself. Previously, the plausibility check was always carried out by higher-level systems. Ultimately, the task of an RFID reader is always the ID number. capture and then pass it on for testing. However, if he carries out the check himself by comparing it with locally stored ID card data, there can be an immediate reaction. This initiates the start of a transaction and/or local control.

 

Panel PC Resistiv Rfid Min

Input and output signals

The FORSIS RFID Reader is equipped with two digital outputs for direct actions and two digital inputs for checking execution or monitoring.
With the help of simple software, ID card numbers can be transmitted to the reader, which remain stored in the reader. Certain attributes can be given to these cards, such as Digital Out 1, 2, transaction, etc.

FORSIS GF MC

"Wir beantworten gerne Ihre Fragen."

+49 (0) 751 76 414 0