Access Control

Vendors

The Access Control System enables the controlled access into an objective, authenticates and registers the visitor’s access preventing unwanted traffic towards the resources. The system can be used inside or outside buildings , supports industry standards and operates with different types of users , applications and services. An access control system can provide solutions for timekeeping , allows defining access areas for each person and the intervals in which it has access , which is essential for human resource management in an organization.

The controlled access into an objective, inside or outside buildings, is achieved by interconnecting dedicated electronic and mechanical elements. The electronic elements realize the identification of the person and generates the access validation. The mechanical elements are controlled by the electronic ones and make it possible for the individual access ( turnstiles , electromagnetic locks , barriers, force electromagnets ). The access systems made today allow unlimited extension, and can communicate events to a programmable central unit.


The components of an access control system

The access control station (or controller) is the central device that connects all field equipments ( card readers , buttons , electromagnets or bolts / electromagnetic locks , extension modules , keypads , sirens , etc.). Also the controller is the device that manages information from the readers (proximity , biometrics, barcode etc.) and commands the mechanical locking elements (electromagnets , locks / electromagnetic locks , turnstiles , gates etc.).

The readers ( of cards , biometrics,of barcodes etc.) are field elements that are accessed by users for them to be checked. They transmit data to the controller that will compare whether the user is registered in the database and can access the objective. If the controller decides that the user is registered in the database with access in that objective, that will activate the mechanical locking element ( electromagnet, locks / electromagnetic locks , turnstile, gate , etc.) , and access will be allowed.

Proximity card readers

are the most commonly used access readers used at this moment. The proximity reader is composed of an antenna and a control unit which converts the signals recieved from the proximity card into the specific communication protocol( Wiegand , RS232, RS485 etc.).

Advantages: the proximity readers are easy to use, the user is only required the proximity card. It provides high speed data transfer to the controller.
Disadvantages: the proximity readers can be easily fooled by a user who stole a valid card .

Biometric Readers - ( fingerprint, hand geometry , face recognition , iris recognition , etc.)

it recognizes the unique biological characteristics of users. The need to install a biometric reader in general appears to objectives that require a high degree of security

Advantages: it can not be fooled by unauthorized persons ( as can happen by finding a code or finding a proximity card ) .
Disadvantages: higher implementation costs compared to other technologies, longer time for verification and recognition.

The mechanic locking elements ( locks / electromagnetic locks , electromagnets , turnstiles , gates etc. ) - provides the mechanical blocking of access roads until thei receive the order of release from the controller after user authentication . The mechanical locking elements can be comanded to open the fire detection systems when it signals a fire alarm .

Electromagnets

They are " fail safe " locks that need fueling in order to produce the electromagnetic field and lock the door.

Turnstiles

Provides the mechanical blocking of access roads .

Emergency buttons are installed inside a controlled space and can be used during the time when the access control systems are not in service , or they have technical problems .

The buttons are mandatory installed on every controlled door .

Centralization and management equipments are personal computers / servers with access control softwares that manages the access control system, the users and the system functions .

Some programs have also a timekeeping software.