CSL CS101-2 EPC CLASS 1 GEN 2 RFID HANDHELD READER
USER'S MANUAL, VERSION 1.0
Copyright © Convergence Systems Limited, All Rights Reserved
194
12.5 Human Access Control by Autonomous Tag
Groups in Reader
Use Case
RFID can be applied to access control system for preventing unauthorized access to a restricted
area.
Current Approach
Most RFID access control systems rely on backend server and database for security controls. If
the server is down or network service is not available, the whole access control system fails.
Suggested Approach
Autonomous access control system with embedded event engine for security controls.
Recommendation
With the embedded event engine in CSL CS-461 reader, autonomous tag group filtering for
access control is achieved. Tag groups can be pre-programmed into the reader easily. Once set,
the access control system can run autonomously even when network or server is down.