Above is the finished project. There is literally nothing to see here. He’s rigged up a hidden RFID reader which locks and unlocks his workstation. The security of the system depends on ...
Once an authorized PIN or RFID card is presented, a CyberKey is then programmed with the users access permissions and released from the cabinet. With the programmed key, the user can access approved ...