Organisations are recognising the benefits of replacing keys, with electronic access control Security systems. Besides, the benefits in lower operating cost & there is ease of administration and a fully integrated identity management solution
Electronic security access control is often done in several small steps. At first only a few central areas are monitored, as system needs expands it becomes part of an integrated security system, integrating into the Surveillance, intrusion, fire and safety system.
"Access control" is a system which enables control to areas and resources in a given physical facility, “access control is also management of people, vehicles and goods to and from access points like, computers, gates, doors, environments etc.
Access control decisions are made by comparing the credential to an access control list. This lookup is be done through a host or server, a database is cross referenced, dependent upon the authorisation levels, control functions are then actioned through the controller.
The controllers are Serial or IP enabled and connect to a host and database using standard networks.
Code Based Access Control
Keypad Entry Systems.
These systems are hardwired in; usually the keypad is mounted outside a control point, most units are weatherproof. These systems controls an electronic mechanism i.e. Gate motor, electric door strike or Magnetic lock.
Magnetic Swipe Cards
Magnetic stripe cards are the size of credit cards and use the same technology as cash point ATM cards. The card information is stored to the magnetic stripe and is read by "swiping" the card through a card reader at access point, these systems are slowly being phased to be replaced with more reliable and more cost effective proximity and smart card technologies.
Proximity cards and readers are recognized as the industry standard for physical access control, these products are robust, affordable, and seamlessly integrate with access control systems, featuring secure coding. The card or tag does not need to make direct contact with the reader but must normally be placed within 5cm to 10cm of the reader. Proximity cards come in a variety of sizes but most modern systems use a card the same size and thickness as a credit card. Proximity tags can be printed onto, clipped to key rings and can provide a more convenient and robust method of access control.
Smart Card | MIFARE
Smart card solutions provide a massive increase in security and functionality. Data transmission is made via either direct physical contact with a reader, or by waving a card within a few inches of a secure contact less interface. Smart cards are a "read/write" device. This enables them to receive and generate information for a variety of applications. With constantly escalating security threats, smart card technology is emerging as the preferred application.
Fingerprint & Hand Geometry Readers
Biometric identification technology has advanced to the state where identification and authentication of people is available via a number of different routes
Fingerprint recognition technology is one of the most developed of all biometric technologies and its price is low enough to see it beginning to make inroads into the mass market
Hand geometry is a biometric that identifies users by the shape of their hands. Hand geometry the first biometric to find widespread computerized use. It remains popular; common applications include access control and time-and attendance operations.
Iris Recognition Technology
Iris recognition is one of the most accurate of all biometric technologies, and is fast becoming a biometric of choice.The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability, or template longevity as, barring trauma, a single enrollment can last a lifetime.