
95/98
© MOBOTIX AG • Security Vision Systems • Made in Germany
RFID (Radio Frequency Identification)
RFID enables data to be transferred contact-free and out of sight using radio waves. An
RFID system infrastructure comprises a transponder, a transceiver device and an IT system
operating in the background.
The transponder, a tiny computer chip with an antenna, is at the heart of this technology.
It is integrated into a carrier object, for example, an adhesive label or a plastic card. The
chip is normally used to store a numerical code. This encrypts information that is stored
in a database. As a result, every object with an RFID transponder has a unique identity.
When close to the antenna of a reading device, passive transponders that do not have
their own power supply are powered by means of inductive or capacitive coupling. The
data is also read out by means of coupling in the inductive field.
RoHS
Abbreviation for Restriction of Hazardous Substances Directive and refers to EC Directive
2002/95/EC, which prohibits the use of certain hazardous substances when manufacturing
products and components. The goal of this directive is to prevent these substances from
harming the environment when the products are disposed of later.
Router
A device that determines the next network node to which a package is to be forwarded
on its way to the target participant. The router creates or maintains a special routing table,
which provides information on how particular destinations can be best reached. Routers
are sometimes integrated into network switches.
Search
Monitoring of recordings or searching for a particular event.
Server
Generally speaking, a server is a computer program that provides services for other
programs, either on the same computer or on a dierent one. A computer on which a
server program is running is often also known as a server. In practice, the server computer
can run a very large number of server and client programs. The program that provides the
requested HTML pages or files for the client (browser) is known as a web server.
(Signal) Inputs and Outputs
Using the digital inputs and outputs on the T24, any device that can switch between an
open and closed circuit can be connected.
Signatures for Video Images
Digital video images can be transferred, as well as jointly edited and deleted, via data
networks. In order to prevent unwanted manipulation and to ensure the validity of digital
video sequences in the case of investigations, it is necessary to faultlessly identify the time
of recording, the origin of the images (camera ID) and the authenticity of the images (no
changes after recording). This is only possible if the images are encrypted for identification.
Digital video cameras with integrated evaluation make it possible to embed a unique
camera ID and the precise time of day in the images, and to encrypt this data so that
any modification or manipulation of the video sequence is exposed during later analysis.
Comentarios a estos manuales