Frequently Asked Questions Readers & Credentials
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Wiegand Converter Board Manual
Wiegand Converter Configuration Utility User Manual 99009020 Rev B Thank You! Congratulations on the purchase of the Wiegand Converter. RF IDeas knows you will enjoy using the converter board as much as we enjoyed creating and developing it! Configuration is easy so you will be able to quickly take advantage of a more secure environment in your business, school, or organization Please call our Sales department if you have any questions or are interested in our OEM and Independent Developer’s programs. We look forward to your comments and suggestions for our product line! Please go to www.RFIDeas.com and follow the Support a Learning Center link for more details about our product line. We are always discovering new applications for our product line(s). There are several software developer’s licensing our technology so the solution you are looking for may already be developed. Thank you, The RF IDeas Staff Need Assistance? Ph: 847.870.1723 Fx: 847.483.1129 E: [email protected] [email protected] 2 Contents 2 Thank You! 13 Chapter 4: Control Protocol 13 Serial OEM ASCII Control Protocol 4 Chapter 1: The Basics 4 Wiegand Converter Overview 15 Chapter 5: OEM-W2065 Connection Diagrams 5 Chapter 2: Installation 5 Wiegand Converter Installation 17 Chapter 6: Glossary 6 Wiegand Converter Board Layout 8 RS-485/422 Connections 18 Chapter 7: Support 9 Jumper Locations 10 Connectors Locations 23 Index 11 Chapter 3: Lock Connection 24 Other Products and Accessories 11 Push Button Magnetic Lock Connection 12 Magnetic Lock Connection 3 The Basics -
734 Wiegand Interface Modules: Level C INSTALLATION and PROGRAMMING GUIDE
734 Wiegand Interface Modules: Level C INSTALLATION AND PROGRAMMING GUIDE TABLE OF CONTENTS About the 734 ............................................. 1 Program the 734 ....................................... 17 Power Supply ......................................................... 1 Program Start Display ......................................17 Zone Terminals ...................................................... 1 Initialization Option ...........................................17 Annunciators .......................................................... 1 Initialize Confirm Option .................................18 Indicator LEDs ....................................................... 1 Activate Zone 2 Bypass ...................................19 Form C Relay ......................................................... 2 Zone 2 Bypass Time .........................................20 Programming Connection ................................ 2 Relock on Zone 2 Change ..............................20 Keypad In and Out Connections ................... 2 Activate Zone 3 Request to Exit ..................21 Zone 3 REX Strike Time ..................................22 PCB Features ...............................................3 Activate Onboard Speaker ............................22 Install the 734 .............................................4 Custom Card Definitions .........................23 Mount the 734 ...................................................... 4 Card Options .......................................................23 Wire the Electronic -
HP Proximity Card Readers, It’S Easy Technologies and Support the Wide Range of to Secure Networked Printers Mobile Devices
Solution brief Enhance security and improve productivity with unified printer authentication across your organization HP proximity, smart card, and Bluetooth® Low Energy (BLE)/ NFC-enabled card readers What if you could… • Help protect confidential documents by releasing print jobs only to the right user? • Enhance the security of networked printers by easily and accurately authenticating users? • Support a wide variety of proximity and smart cards, and digital credentials on mobile devices with one reader? • Leverage the flexibility and accessibility of mobile credentials for secure print release on HP MFPs and printers? • Meet Health Insurance Portability and Accountability Act (HIPAA) privacy requirements for access to patient records? With HP's proximity card readers with mobile credential support—you can. Multicard authentication for Network security for the world’s HP printers most secure MFPs and printers1 Unified, enterprise-wide access control no HP printers and MFPs are the most secure longer has to be cumbersome or expensive. printing devices in the world.1 But it’s easy Now you can protect confidential information for customers to overlook the fact that these HP card readers support and manage access to printing and imaging network-connected devices serve as access devices by enabling user authentication through points to the corporate network. As with any proximity cards, smart cards, access cards, badges, and digital credentials network endpoint, organizations need to on mobile devices. HP dual frequency card actively control who has physical access and and digital credentials on readers incorporate multiple communication how. With HP proximity card readers, it’s easy technologies and support the wide range of to secure networked printers mobile devices. -
Unlocking the Smart Card
Episode Four: Unlocking the Smart Card This is an excerpt from Unlocked — an ASSA ABLOY podcast series on campus security. Unlocked explores the security issues and challenges that colleges and universities face as they strive to create a safe and secure learning environment. Visit intelligentopenings.com/unlocked to hear more. How We Got Smart Before diving into the current broken cards and physical wear on the credential technologies, it helps to readers. Prox solved these problems. understand where we came from. Lower maintenance costs, increased In 1960, a young engineer from IBM user convenience, and new options named Forrest Parry invented the for form factors like fobs made the magnetic stripe card. Once prox card a winner. But the low- ubiquitous on campus doors, more frequency proximity technology is reliable and secure technologies not without its limitations. are quickly eclipsing the mag stripe. Mag stripe cards are simple. A card gets swiped in a reader. That reader then reads a sequence of numbers Outside of higher stored on the stripe of that card. education and If the number matches what’s stored in the access system’s older hotels, hardly Whether installing a new door access database, the door unlocks. system for your campus or upgrading from a legacy system you have a lot of Many campuses still use the mag anyone still uses decisions to make. stripe card for their door access. This is mainly because the cards are mag stripe cards You first must choose the right access inexpensive, the cost to replace the software and locking hardware. -
Alarm Lock Catalog (ALA112U)
Wireless & standalone access control door solutions trusted by more schools & universities, offices, retail chains & healthcare providers table of contents TRILOGY T2/ DL2700 STANDALONE DIGITAL PIN CODE LOCKS, CYLINDRICAL, DUAL-SIDED, MORTISE & EXIT DOORS . 2 TRILOGY CLASSROOM LOCKDOWN DL2700LD . 2 TRILOGY AUDIT TRAIL/PC-PROGRAMMABLE PUSHBUTTON LOCKS . 3 TRILOGY PROX LOCKS WITH HID PROX ID CARD READERS . 4 TRILOGY DOUBLE-SIDED PIN CODE AND PIN/PROX STANDALONE LOCKS . 5 TRILOGY STANDALONE LOCKS FOR PRIVACY AND SPECIAL APPLICATIONS . 6 TRILOGY HIGH SECURITY STANDALONE MORTISE LOCKS . 7 TRILOGY EXIT ADDS AUDIT TRAIL AND AUTO LOCK/UNLOCK TO PANIC EXITS . 8 TRILOGY NARROW STILE TRIM FOR ALL GLASS/ALUMINUM DOORS AND PANIC EXIT DOORS . 9-10 MATCHING TRILOGY DIGITAL PIN & PROX ACCESS 12/24V KEYPADS WITH AUDIT TRAIL . 10 TRILOGY AUDIT TRAIL AND PROGRAMMING ACCESSORIES, FINISHES AND ORDERING INFORMATION . .. 11 WIRELESS NETWORX KEYPADS & NETPANEL . 12-13 TRILOGY NETWORX WIRELESS 802 .11/ETHERNET LOCK ACCESS SYSTEMS . 14-17 ILOCK APP . 17 ARCHITECH DESIGNER WIRELESS ACCESS CONTROL LOCKING PLATFORM . 18-21 SIRENLOCK EXIT ALARMS: WATERPROOF, INTERIOR, AND DELAYED EGRESS . 22 REMOTE RELEASE MAG LOCKS, POWERMAGS AND RTES . 23 ADVANCED DOOR ALARMS . 24 ESSENTIAL ADD-ONS AND EXTRAS . 25 TRILOGY FAMILY OF ACCESS PRODUCTS CHART . 26-27 K-12 AND CAMPUS LOCDOWN SOLUTIONS . 28 ABOUT US, RETAIL LOCKSMITHS PROFIT CENTER PROGRAM AND TRAINING . 29 Trilogy: The leading electronic access locks ® Trilogy: hospital retail airport schools pharmacy office Retrofit Any -
(Wiegand Interface) NDK-2025 Reader with Integrated
Installation Sheet (Wiegand Interface) NDK-2025 Reader with Integrated Keypad Reader Description The NDK-2025 Reader is a radio-frequency proximity reader with integrated keypad for Access Control Systems. The Reader consists of a 12-key PIN pad, transmit/receive antenna, and reader electronics, in a durable metal housing. The reader and keypad electronics are potted with urethane resin to protect against the environment. The NDK-2025 Reader may be mounted like a cover plate on a single-gang electrical utility box, or on any surface. Parts List (a) Installation Sheet (b) Sentinel-Prox NDK-2025 Reader Installation Procedure 1. Install a single-gang electrical utility box, or drill two no. 27 (0.144 inch) clearance holes for the reader’s screws and one hole for the cable, at the desired location. Observe ADA height requirements. 2. Clip off the white 10-pin in-line connector from the end of the reader’s cable. Keep the wires as long as possible. 3. Remove reader’s back plate, and install it on an electrical utility box or other surface. The supplied screws can be used to fasten the back plate to a utility box (item c in the Parts List). 4. Connect the reader’s cable to the access control panel as shown in Figure 1. Connect the yellow wire only if used for Beeper control by the panel. In steps 8 and 9, let the yellow wire float. Do not connect the orange and violet wires to anything. Tape or cap all unused wires singly. 5. For red and black wires, use a linear regulated DC power supply, between 5V and 12V. -
Rfids and Secret Handshakes: Defending Against Ghost-And-Leech Attacks and Unauthorized Reads with Context-Aware Communications
RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications Alexei Czeskis Karl Koscher University of Washington University of Washington [email protected] [email protected] Joshua R. Smith Tadayoshi Kohno Intel Research Seattle University of Washington [email protected] [email protected] ABSTRACT 1. INTRODUCTION We tackle the problem of defending against ghost-and-leech Radio frequency identification tags (RFIDs) and other con- (a.k.a. proxying, relay, or man-in-the-middle) attacks against tactless cards (like proximity cards and contactless smart- RFID tags and other contactless cards. The approach we cards) are increasing in ubiquity. For example, large corpo- take — which we dub secret handshakes — is to incorpo- rations often use RFIDs or proximity cards to regulate build- rate gesture recognition techniques directly on the RFID ing access. American Express, VISA, and MasterCard all tags or contactless cards. These cards will only engage in produce credit cards with embedded RFID tags. Many car wireless communications when they internally detect these keys also have embedded RFID tags to help protect against secret handshakes. We demonstrate the effectiveness of this hot-wiring. While the security community has invested sig- approach by implementing our secret handshake recognition nificant resources in understanding and addressing the se- system on a passive WISP RFID tag with a built-in ac- curity deficiencies of such cards — including documented celerometer. Our secret handshakes approach is backward attacks against and defensive recommendations for each of compatible with existing deployments of RFID tag and con- the above examples [2, 11, 13] — there exists one class of tactless card readers. -
Xceedid OEM 100 User Guide
OEM 100 User Manual Figure 1: OEM 100 Module with HG Rectangular Antenna Board Revision History Revision History Release Version Date Revision Description Authors Version 1.0 07/20/09 Initial Release Bryan Hoff and Jeremy Morton Version 1.1 07/30/10 Feature updates Bryan Hoff Version 1.2 08/05/10 Overhaul of document Bryan Hoff Version 1.3 08/17/10 Updated graphics Bryan Hoff Version 1.5 09/01/10 Applied XceedID branding Marian Sasso Contents Revision History ...................................................................................................................................................... 2 General Description ................................................................................................................................................ 3 Specifications .......................................................................................................................................................... 4 Physical Dimensions........................................................................................................................................... 4 Electrical Specifications ...................................................................................................................................... 4 Card Specifications ...................................................................................................................................... 5 Card Technologies Supported ..................................................................................................................... -
PARAS 0017 – Access Control Card Technology Guidance
PROGRAM FOR APPLIED PARAS RESEARCH IN AIRPORT SECURITY PARAS 0017 October 2019 Access Control Card Technology Guidance National Safe Skies Alliance, Inc. Sponsored by the Federal Aviation Administration PARAS 0017 October 2019 Author(s) TranSecure Inc. Olney, MD National Safe Skies Alliance Louisville, TN © 2019 National Safe Skies Alliance, Inc. All rights reserved. COPYRIGHT INFORMATION Authors herein are responsible for the authenticity of their materials and for obtaining written permissions from publishers or persons who own the copyright to any previously published or copyrighted material used herein. National Safe Skies Alliance, Inc. (Safe Skies) grants permission to reproduce material in this publication for classroom and not-for-profit purposes. Permission is given with the understanding that none of the material will be used to imply Safe Skies or Federal Aviation Administration (FAA) endorsement of a particular product, method, or practice. It is expected that those reproducing the material in this document for educational and not-for-profit uses will give appropriate acknowledgment of the source of any reprinted or reproduced material. For other uses of the material, request permission from Safe Skies. NOTICE The project that is the subject of this report was a part of the Program for Applied Research in Airport Security (PARAS), managed by Safe Skies and funded by the FAA. The members of the technical panel selected to monitor this project and to review this report were chosen for their special competencies and with regard for appropriate balance. The report was reviewed by the technical panel and accepted for publication according to procedures established and overseen by Safe Skies. -
FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience
FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007 Developed by: Smart Card Alliance Physical Access Council Smart Card Alliance © 2007 1 About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org. The Physical Access Council is focused on accelerating the widespread acceptance, usage, and application of smart card technology for physical access control. The group brings together, in an open forum, leading users and technologists from both the public and private sectors and works on activities that are important to the physical access industry and that will address key issues that end user organizations have in deploying new physical access system technology. The Physical Access Council includes participants from across the smart card and physical access control system industry, including end users; smart card chip, card, software and reader vendors; physical access control systems vendors; and integration service providers. Physical Access Council participation is open to any Smart Card Alliance member who wishes to contribute to the Council projects. Additional information about the use of smart cards for secure identity applications can be found at http://www.smartcardalliance.org. -
Strong Authentication
WHITE PAPER Strong Authentication How to achieve the level of Identity Assurance you need, in a way that’s both convenient and affordable Executive Summary It’s a constant challenge to accommodate all the different access needs of all your users, while simultaneously locking down your resources to protect them from threats. To trust your users are who they say they are and effectively manage their access to your resources, you need a complete identity assurance solution, the foundation of which is strong authentication. The issuance and ongoing management, however, of user credentials, on all the various devices, from smart cards to mobile phones you need to support, for all the applications and resources your users may want to access can pose its own issues. As a result, you need a strong authentication solution that makes it easy for you to issue and manage credentials to provide differing levels of security for differing levels of access in a way that is convenient for the user – anything less negates the effectiveness of the overall solution. WHITE PAPER Strong Authentication 2 Table of Contents 1. Executive summary 3. The need for Strong Authentication in today’s enterprise 3. Defining Strong Authentication to address the challenges of traditional solutions 4. Requirements for effective Strong Authentication – no compromises 5. The approach for a Strong Authentication solution capable of delivering your users the secure access they need 8. ActivID card management system 8. Reaping the benefits of an effective Strong Authentication solution 10. The ActivID difference – peace of mind for users and organisations WHITE PAPER Strong Authentication 3 The need for Strong Authentication in today’s Enterprise Users are increasingly distributed, mobile and varied, requiring many enterprises to take a new look at how to establish trust in a user’s identity and control their access accordingly. -
P2000/P2000LE Security Management System
P2000/P2000LE Security Management System Web Access Option Version 3.8 and higher, April, 2008 09-9303-01 Revision A P2000/P2000LE Security Management System Web Access Version 3.8 and higher, April, 2008 09-9303-01 Revision A Security Solutions (805) 522-5555 www.johnsoncontrols.com Copyright 2008 Johnson Controls, Inc. All Rights Reserved No part of this document may be reproduced without the prior permission of Johnson Controls, Inc. Acknowledgment Cardkey P2000, BadgeMaster, and Metasys are trademarks of Johnson Controls, Inc. All other company and product names are trademarks or registered trademarks of their respective owners. If this document is translated from the original English version by Johnson Controls, Inc., all reasonable endeavors will be used to ensure the accuracy of translation. Johnson Controls, Inc. shall not be liable for any translation errors contained herein or for incidental or consequential damages in connection with the furnishing or use of this translated material. Due to continuous development of our products, the information in this document is subject to change without notice. Johnson Controls, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with furnishing or use of this material. Contents of this publication may be preliminary and/or may be changed at any time without any obligation to notify anyone of such revision or change, and shall not be regarded as a warranty. TABLE OF CONTENTS Chapter 1: Introduction Chapter Summaries................................................................................................................................