. "\u94A5\u5319\u5361\u53C8\u7A31\u623F\u5361\u3001\u9580\u7981\u5361\uFF0C\u662F\u4E00\u7A2E\u5361\u7247\u5F62\u5F0F\u7684\u9470\u5319\u3002\u94A5\u5319\u5361\u53EF\u4EE5\u6253\u958B\u623F\u9593\u4EE5\u53CA\u5927\u9580\u3002\u94A5\u5319\u5361\u5916\u89C0\u4E0A\u770B\u4E0A\u53BB\u662F\u4E00\u5F35\u5851\u6599\u5361\u7247\uFF0C\u4F46\u5BE6\u969B\u4E0A\u5145\u7576\u4E86\u9470\u5319\u7684\u529F\u80FD\u3002\u8BE5\u5361\u7247\u901A\u5E38\u4E0E\u4FE1\u7528\u5361\u6216\u7F8E\u56FD\u548C\u6B27\u76DF\u9812\u767C\u7684\u9A7E\u9A76\u6267\u7167\u5177\u6709\u76F8\u540C\u7684\u5C3A\u5BF8\u3002\u73FE\u5728\u8A31\u591A\u8CD3\u9928\u548C\u9152\u5E97\u90FD\u7528\u623F\u5361\u4F86\u4EE3\u66FF\u94A5\u5319\uFF0C\u9019\u4E9B\u5361\u4E0A\u9762\u5E26\u6709\u78C1\u6761\u6216\u82AF\u7247\u3002\u6BCF\u6765\u4E00\u4E2A\u65B0\u5BA2\u4EBA\u5165\u4F4F\u5C31\u4F7F\u7528\u4E00\u4E2A\u65B0\u7684\u4EE3\u7801\u4FE1\u606F\u3002"@zh . . . . . . . . . . . . . . . . . . . . "\u0627\u0644\u0642\u0641\u0644 \u0627\u0644\u0631\u0642\u0645\u064A \u0623\u0648 \u0642\u0641\u0644 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: (keycard lock) \u0647\u0648 \u0642\u0641\u0644 \u064A\u0641\u062A\u062D \u0628\u0639\u062F \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0628\u0637\u0627\u0642\u0629 \u0630\u0643\u064A\u0629 \u062A\u0639\u0645\u0644 \u0639\u0645\u0644 \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0627\u0644\u0639\u0627\u062F\u064A\u0629\u060C \u0648\u0647\u064A \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0628\u0637\u0627\u0642\u0629 \u0628\u0644\u0627\u0633\u062A\u064A\u0643\u064A\u0629 \u0645\u0633\u062A\u0637\u064A\u0644\u0629 \u0630\u0627\u062A \u0623\u0628\u0639\u0627\u062F \u0645\u0645\u0627\u062B\u0644\u0629 \u0644\u062A\u0644\u0643 \u0627\u0644\u0645\u0648\u062C\u0648\u062F\u0629 \u0641\u064A \u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646 \u0623\u0648 \u0631\u062E\u0635\u0629 \u0627\u0644\u0642\u064A\u0627\u062F\u0629 \u0627\u0644\u0623\u0645\u0631\u064A\u0643\u064A\u0629 \u0648\u0627\u0644\u0627\u062A\u062D\u0627\u062F \u0627\u0644\u0623\u0648\u0631\u0648\u0628\u064A . \u0648\u062A\u062E\u0632\u0646 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0646\u0642\u0634\u064B\u0627 \u0645\u0627\u062F\u064A\u064B\u0627 \u0623\u0648 \u0631\u0642\u0645\u064A\u064B\u0627 \u062A\u0642\u0628\u0644\u0647 \u0622\u0644\u064A\u0629 \u0627\u0644\u0628\u0627\u0628 \u0642\u0628\u0644 \u0641\u062A\u062D \u0627\u0644\u0642\u0641\u0644. \u0647\u0646\u0627\u0643 \u0639\u062F\u0629 \u0623\u0646\u0648\u0627\u0639 \u0634\u0627\u0626\u0639\u0629 \u0645\u0646 \u0627\u0644\u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0631\u0626\u064A\u0633\u064A\u0629 \u0642\u064A\u062F \u0627\u0644\u0627\u0633\u062A\u062E\u062F\u0627\u0645\u060C \u0628\u0645\u0627 \u0641\u064A \u0630\u0644\u0643 \u0627\u0644\u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0645\u064A\u0643\u0627\u0646\u064A\u0643\u064A\u0629\u060C \u0627\u0644\u0628\u0627\u0631\u0643\u0648\u062F \u060C \u0627\u0644\u0634\u0631\u064A\u0637 \u0627\u0644\u0645\u063A\u0646\u0627\u0637\u064A\u0633\u064A\u060C \u0628\u0637\u0627\u0642\u0627\u062A Wiegand \u0627\u0644\u062A\u064A \u062A\u062D\u0648\u064A \u0639\u0644\u0649 \u0627\u0644\u0623\u0633\u0644\u0627\u0643\u060C \u0648 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0630\u0643\u064A\u0629 (\u0627\u0644\u0645\u062D\u062A\u0648\u064A\u0629 \u0639\u0644\u0649 \u0631\u0642\u0627\u0642\u0629 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A\u0629 \u0644\u0644\u0642\u0631\u0627\u0621\u0629 / \u0627\u0644\u0643\u062A\u0627\u0628\u0629) \u060C \u0648\u0628\u0637\u0627\u0642\u0627\u062A \u0645\u0648\u062C\u0627\u062A \u0627\u0644\u0631\u0627\u062F\u064A\u0648 RFID ."@ar . . . . . . . "Ett passersystem \u00E4r ett tekniskt system av elektroniska l\u00E5s. F\u00F6r \u00F6ppning av en d\u00F6rr brukar man s\u00E4ga att det kr\u00E4vs 1. \n* n\u00E5got man har (en passerbricka) 2. \n* n\u00E5got man \u00E4r (biometrisk information) 3. \n* n\u00E5got man kan (en kod) F\u00F6r en s\u00E4ker l\u00F6sning skall man kombinera minst tv\u00E5, men g\u00E4rna alla tre av dessa. Normalt r\u00E4knas kodl\u00E5s inte in i kategorin passersystem. Den st\u00F6rsta skillnaden j\u00E4mf\u00F6rt med ett traditionellt l\u00E5ssystem \u00E4r normalt f\u00F6ljande:"@sv . . . . . "\u0627\u0644\u0642\u0641\u0644 \u0627\u0644\u0631\u0642\u0645\u064A \u0623\u0648 \u0642\u0641\u0644 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: (keycard lock) \u0647\u0648 \u0642\u0641\u0644 \u064A\u0641\u062A\u062D \u0628\u0639\u062F \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0628\u0637\u0627\u0642\u0629 \u0630\u0643\u064A\u0629 \u062A\u0639\u0645\u0644 \u0639\u0645\u0644 \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0627\u0644\u0639\u0627\u062F\u064A\u0629\u060C \u0648\u0647\u064A \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0628\u0637\u0627\u0642\u0629 \u0628\u0644\u0627\u0633\u062A\u064A\u0643\u064A\u0629 \u0645\u0633\u062A\u0637\u064A\u0644\u0629 \u0630\u0627\u062A \u0623\u0628\u0639\u0627\u062F \u0645\u0645\u0627\u062B\u0644\u0629 \u0644\u062A\u0644\u0643 \u0627\u0644\u0645\u0648\u062C\u0648\u062F\u0629 \u0641\u064A \u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646 \u0623\u0648 \u0631\u062E\u0635\u0629 \u0627\u0644\u0642\u064A\u0627\u062F\u0629 \u0627\u0644\u0623\u0645\u0631\u064A\u0643\u064A\u0629 \u0648\u0627\u0644\u0627\u062A\u062D\u0627\u062F \u0627\u0644\u0623\u0648\u0631\u0648\u0628\u064A . \u0648\u062A\u062E\u0632\u0646 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0646\u0642\u0634\u064B\u0627 \u0645\u0627\u062F\u064A\u064B\u0627 \u0623\u0648 \u0631\u0642\u0645\u064A\u064B\u0627 \u062A\u0642\u0628\u0644\u0647 \u0622\u0644\u064A\u0629 \u0627\u0644\u0628\u0627\u0628 \u0642\u0628\u0644 \u0641\u062A\u062D \u0627\u0644\u0642\u0641\u0644. \u0647\u0646\u0627\u0643 \u0639\u062F\u0629 \u0623\u0646\u0648\u0627\u0639 \u0634\u0627\u0626\u0639\u0629 \u0645\u0646 \u0627\u0644\u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0631\u0626\u064A\u0633\u064A\u0629 \u0642\u064A\u062F \u0627\u0644\u0627\u0633\u062A\u062E\u062F\u0627\u0645\u060C \u0628\u0645\u0627 \u0641\u064A \u0630\u0644\u0643 \u0627\u0644\u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0645\u064A\u0643\u0627\u0646\u064A\u0643\u064A\u0629\u060C \u0627\u0644\u0628\u0627\u0631\u0643\u0648\u062F \u060C \u0627\u0644\u0634\u0631\u064A\u0637 \u0627\u0644\u0645\u063A\u0646\u0627\u0637\u064A\u0633\u064A\u060C \u0628\u0637\u0627\u0642\u0627\u062A Wiegand \u0627\u0644\u062A\u064A \u062A\u062D\u0648\u064A \u0639\u0644\u0649 \u0627\u0644\u0623\u0633\u0644\u0627\u0643\u060C \u0648 \u0627\u0644\u0628\u0637\u0627\u0642\u0629 \u0627\u0644\u0630\u0643\u064A\u0629 (\u0627\u0644\u0645\u062D\u062A\u0648\u064A\u0629 \u0639\u0644\u0649 \u0631\u0642\u0627\u0642\u0629 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A\u0629 \u0644\u0644\u0642\u0631\u0627\u0621\u0629 / \u0627\u0644\u0643\u062A\u0627\u0628\u0629) \u060C \u0648\u0628\u0637\u0627\u0642\u0627\u062A \u0645\u0648\u062C\u0627\u062A \u0627\u0644\u0631\u0627\u062F\u064A\u0648 RFID . \u0645\u0646 \u0627\u0644\u0645\u0639\u062A\u0627\u062F \u0623\u0646 \u062A\u064F\u0633\u062A\u0639\u0645\u0644 \u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0641\u064A \u0627\u0644\u0641\u0646\u0627\u062F\u0642 \u0643\u0628\u062F\u064A\u0644 \u0644\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0627\u0644\u0645\u064A\u0643\u0627\u0646\u064A\u0643\u064A\u0629. \u0648\u0642\u062F \u0643\u0627\u0646 \u0623\u0648\u0644 \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u062A\u062C\u0627\u0631\u064A \u0644\u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0647\u0648 \u0644\u0631\u0641\u0639 \u0648\u0625\u0646\u0632\u0627\u0644 \u0628\u0648\u0627\u0628\u0629 \u0645\u0648\u0627\u0642\u0641 \u0627\u0644\u0633\u064A\u0627\u0631\u0627\u062A \u0627\u0644\u0622\u0644\u064A\u0629 \u062D\u064A\u062B \u064A\u062F\u0641\u0639 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645\u0648\u0646 \u0631\u0633\u0648\u0645\u064B\u0627 \u0634\u0647\u0631\u064A\u0629."@ar . "\u94A5\u5319\u5361\u53C8\u7A31\u623F\u5361\u3001\u9580\u7981\u5361\uFF0C\u662F\u4E00\u7A2E\u5361\u7247\u5F62\u5F0F\u7684\u9470\u5319\u3002\u94A5\u5319\u5361\u53EF\u4EE5\u6253\u958B\u623F\u9593\u4EE5\u53CA\u5927\u9580\u3002\u94A5\u5319\u5361\u5916\u89C0\u4E0A\u770B\u4E0A\u53BB\u662F\u4E00\u5F35\u5851\u6599\u5361\u7247\uFF0C\u4F46\u5BE6\u969B\u4E0A\u5145\u7576\u4E86\u9470\u5319\u7684\u529F\u80FD\u3002\u8BE5\u5361\u7247\u901A\u5E38\u4E0E\u4FE1\u7528\u5361\u6216\u7F8E\u56FD\u548C\u6B27\u76DF\u9812\u767C\u7684\u9A7E\u9A76\u6267\u7167\u5177\u6709\u76F8\u540C\u7684\u5C3A\u5BF8\u3002\u73FE\u5728\u8A31\u591A\u8CD3\u9928\u548C\u9152\u5E97\u90FD\u7528\u623F\u5361\u4F86\u4EE3\u66FF\u94A5\u5319\uFF0C\u9019\u4E9B\u5361\u4E0A\u9762\u5E26\u6709\u78C1\u6761\u6216\u82AF\u7247\u3002\u6BCF\u6765\u4E00\u4E2A\u65B0\u5BA2\u4EBA\u5165\u4F4F\u5C31\u4F7F\u7528\u4E00\u4E2A\u65B0\u7684\u4EE3\u7801\u4FE1\u606F\u3002"@zh . . . . . . . . . . "1123660244"^^ . . . . . "Passersystem"@sv . "7905"^^ . . . . . . . . . . . . "A keycard lock is a lock operated by a keycard, a flat, rectangular plastic card. The card typically, but not always, has identical dimensions to that of a credit card or American and EU driver's license. The card stores a physical or digital pattern that the door mechanism accepts before disengaging the lock. There are several common types of keycards in use, including the mechanical holecard, barcode, magnetic stripe, Wiegand wire embedded cards, smart card (embedded with a read/write electronic microchip), RFID, and NFC proximity cards."@en . . "\u94A5\u5319\u5361"@zh . "A keycard lock is a lock operated by a keycard, a flat, rectangular plastic card. The card typically, but not always, has identical dimensions to that of a credit card or American and EU driver's license. The card stores a physical or digital pattern that the door mechanism accepts before disengaging the lock. There are several common types of keycards in use, including the mechanical holecard, barcode, magnetic stripe, Wiegand wire embedded cards, smart card (embedded with a read/write electronic microchip), RFID, and NFC proximity cards. Keycards are frequently used in hotels as an alternative to mechanical keys. The first commercial use of key cards was to raise and lower the gate at automated parking lots where users paid a monthly fee."@en . . . "6336134"^^ . "Keycard lock"@en . . . "\u0642\u0641\u0644 \u0627\u0644\u0628\u0637\u0627\u0642\u0629"@ar . . . . "Ett passersystem \u00E4r ett tekniskt system av elektroniska l\u00E5s. F\u00F6r \u00F6ppning av en d\u00F6rr brukar man s\u00E4ga att det kr\u00E4vs 1. \n* n\u00E5got man har (en passerbricka) 2. \n* n\u00E5got man \u00E4r (biometrisk information) 3. \n* n\u00E5got man kan (en kod) F\u00F6r en s\u00E4ker l\u00F6sning skall man kombinera minst tv\u00E5, men g\u00E4rna alla tre av dessa. Normalt r\u00E4knas kodl\u00E5s inte in i kategorin passersystem. I de flesta passersystem anv\u00E4nds idag kort eller nyckelbrickor som elektroniska nycklar. Nyckelbrickorna har m\u00E5nga namn - ofta \u00E4r det lokala namn som myntats av en l\u00E5ssmed och som sprids till anv\u00E4ndare. Det f\u00F6rekommer namn som droppe (baserat p\u00E5 formen p\u00E5 m\u00E5nga tidiga brickor), tagg (fr\u00E5n engelskans key tag), plopp, plastnyckel, elektronisk nyckel, nyckelbricka, n\u00E4rhetstoken, och s\u00E5 vidare. Idag kallar m\u00E5nga brickorna helt enkelt f\u00F6r nyckel och kallar gamla mekaniska nycklar f\u00F6r nyckel\u00E4mnen. Den st\u00F6rsta skillnaden j\u00E4mf\u00F6rt med ett traditionellt l\u00E5ssystem \u00E4r normalt f\u00F6ljande: 1. \n* Systemet loggar anv\u00E4ndandet, s\u00E5 att man i efterhand kan kontrollera vem som passerat den aktuella d\u00F6rren vid vilken tid. 2. \n* Administrat\u00F6ren kan koppla olika tidszoner till d\u00F6rren s\u00E5 att man kan l\u00E5ta personen med nyckeln passera endast vid vissa tider. 3. \n* Administrat\u00F6ren kan enkelt sp\u00E4rra nycklar som tappats bort. 4. \n* Anv\u00E4ndaren kan normalt utg\u00E5 ifr\u00E5n att det inte existerar n\u00E5gon \"dubblettnyckel\", vilket finns i traditionella nyckelsystem. Det \u00E4r idag dock relativt enkelt att kopiera vissa former av kort eller brickor och \u00E4ven om det inte finns k\u00E4nda brott beg\u00E5ngna med s\u00E5dan teknik \u00E4r det mycket troligt att det f\u00F6rekommit."@sv . . . . . . . . . . . . . .