КЛЮЧІ ТА ІДЕНТИФІКАТОРИ В СИСТЕМАХ УПРАВЛІННЯ ДОСТУПОМ. KEY AND IDENTIFIERS IN ACCESS CONTROL SYSTEMS

dc.contributor.authorБілогуров, В.А.
dc.contributor.authorBilohurov, V.A.
dc.contributor.authorНазарок, Д.С.
dc.contributor.authorNazarok, D.S.
dc.date.accessioned2023-09-24T10:21:51Z
dc.date.available2023-09-24T10:21:51Z
dc.date.issued2019
dc.description.abstractThe subject of this article was the main and auxiliary means and devices, which allowed first to differentiate access to information and objects, and subsequently to automate such access. Contact, non-contact and combined smart cards that operate at 125 kHz or 13.56 MHz (in near-field communication systems) are considered. Standards are described in specifications ISO 18902, ISO 7816, ISO 14443 variants A and B (less frequently ISO/IEC 15693), EMV (Europay, MasterCard, Visa), IPS/JEDEC J-STD- 020C, ECMA. Typical use of smart cards (tags) is discussed: – access control and time management at enterprises; – paid access to car parks, lifts, attractions, etc; – payments for the use of public transport; – replacement or addition of bank and discount cards with magnetic stripe; – keyless access to vehicles. There are three main card standards: Mifare, EM Marine and HID. The media standard is defined by the chip. The tag allows data encryption and provides up to 100,000 overwrite cycles. Design and element base of maps are considered. Attention paid to the volume of tags memory and the use of new technologies. Ways of protection against unauthorized interference such as traditional technologies of data encryption AES (Advaced Encryption Standard), SHA (Secure Hash Algorithm), and American FIPS (Federal Informaion Processing Standards) are considered. The article focuses on the use of biometric module AT77SM0101BCBO2VKE manufacturing Atmel in particular for foreign passports. Design and peculiarities of operation of readers, as well as the use of common tags for anti-theft systems of cars are considered. Possessing the basic functionality of systems and components of remote access control can be useful to practitioners in implementing law enforcement practices.uk_UA
dc.identifier.urihttp://elar.naiau.kiev.ua/jspui/handle/123456789/25589
dc.language.isouk_UAuk_UA
dc.subjectідентифікатори доступуuk_UA
dc.subjectсмарт-картиuk_UA
dc.subjectзчитувачuk_UA
dc.subjectaccess identifiersuk_UA
dc.subjectsmart cardsuk_UA
dc.subjectreaderuk_UA
dc.titleКЛЮЧІ ТА ІДЕНТИФІКАТОРИ В СИСТЕМАХ УПРАВЛІННЯ ДОСТУПОМ. KEY AND IDENTIFIERS IN ACCESS CONTROL SYSTEMSuk_UA
dc.typeArticleuk_UA
local.udk519.711:343.98uk_UA
local.vidНаукові періодичні видання, мультимедійні презентації, засоби контролю знань, спеціалізовані компьютерні програми.uk_UA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sstt_2019_1_3.pdf
Size:
581.29 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: