Cars, trucks, or other vehicles--even forklifts in warehouse environments--can be tagged with passive RFID transmitters. When a restricted area, or a parking lot entrance, is approached, a reader at the site accesses the tag. If the vehicle is authorized, the gate opens and it is allowed to pass. In the very simplest systems, the mechanism works in pass/fail mode--access granted or access denied. However, if the data from the tag can be connected with a database, functionality of the system is greatly enhanced.
Now, with our technology readers and gate control mechanisms can be remotely monitored and controlled via Ethernet. This network-enabled configuration opens up many possibilities for RFID-based access control systems. For example, a prepaid account can be linked to the car's RFID tag. The RFID reader authorizes the car for entry, logs entry time, and transmits that data back to the server, then the gate mechanism is activated and the car enters. A similar exit point is configured, and when the car leaves the RFID reader logs exit time, releases the gate mechanism, and transmits the exit data back to the server. The customer's account is then debited for the time she spent in the parking lot.
Now, with our technology readers and gate control mechanisms can be remotely monitored and controlled via Ethernet. This network-enabled configuration opens up many possibilities for RFID-based access control systems. For example, a prepaid account can be linked to the car's RFID tag. The RFID reader authorizes the car for entry, logs entry time, and transmits that data back to the server, then the gate mechanism is activated and the car enters. A similar exit point is configured, and when the car leaves the RFID reader logs exit time, releases the gate mechanism, and transmits the exit data back to the server. The customer's account is then debited for the time she spent in the parking lot.