Secom Systems

Welcome To Secom Systems

A Dahua Products Authorized Dealer

secomsvg

Call Us +254 724 037 449

All you need to know about Access Control Systems

  • What are they?
  • How do they work?
  • What are the types?

Access control is a security system which restricts access to a place or resource to those with permission. Physical access control systems limit access to a building or room to authorised personnel only. Logical access control limits access to computer networks, files and data.

An access control system is an electronic system which works in a network.

This network consists of readers which connect to a central point.

Together, this controls who can enter a building, only allowing those with the authorised ID code to enter.

  • Proximity
  • Magnetic stripe
  • Hands-free
  • Biometric
  • Smart card
  • key fob
  • Token
  • Card or keypad

The proximity card readers use an electromagnetic field to detect nearby cards and transmit data through the reader to the access control panel. If the card is authorized, the control panel sends a signal back to the reader to trigger a door unlock.

There’s a good reason why proximity readers are so common in offices and commercial spaces around the world. First, they are fairly simple to implement. Proximity card reader technology has been around for decades, and people are familiar with how to use them, so they require little training or ramp-up time once installed.

Proximity cards (also known as prox cards) can also provide a contactless access experience. Unlike swipe cards, prox cards don’t need to be inserted into or swiped through a reader to work. The proximity card has a metallic antenna coil embedded inside that holds encoded data. The proximity card readers use an electromagnetic field to detect nearby cards and transmit data through the reader to the access control panel. If the card is authorized, the control panel sends a signal back to the reader to trigger a door unlock. The proximity technology can also be used in key fobs, clamshell cards, or stickers. This is great for implementing touchless technology to create healthier spaces.

Depending on the access control software, proximity card systems can provide businesses with trackable entry activity, and data analytics for their space. A cloud-based platform like Openpath will provide the most flexibility, giving administrators and facilities teams remote access to manage their access control system from anywhere.

Many card access systems also offer numeric keypad features as additional options to their card readers.

These systems are two-step validation systems that offer a higher level of access control and security. However, they require additional time for individuals to be processed.

The typical access procedures for these systems require that the user present the card to the card reader and then enter a unique PIN on the numeric keypad.

Many facilities elect to use only the card portion of the system during peak access hours. This helps the system maximize the number of individuals who can be processed during high-volume periods.

During times of lower volumes, the use of a PIN as a second validation method provides protection against unreported lost or stolen cards.

Hands free access control works by using either an access card or an app on your phone that allows for reading (via RFID or BlueTooth) at a distance of up to a couple of meters. Ideally, thus, you simply walk up to the door and it opens.

Biometric access control analyzes specific biological data, e.g. fingerprints. ... Individuals are scanned when they use the access control system. If their biological data is on-record, they're granted access. If there's no match for their biological data, they're denied access.

Smart cards can also help protect corporate information networks — so-called logical access control, as compared with physical access control for entry into a facility. ... In a logical access control system, a user's smart card is inserted into a card reader linked to the cardholder's workstation.

The key fob uses radio waves to signal to the reader or the electronic box to allow access. When these waves don't match the programming the fob will deny access and the door will remain locked. When it matches the door will unlock letting the person with the fob enter.

A security token provides authentication for accessing a system through any device that generates a password. ... The device generates a new password every time it is used, so a security token can be used to log in to a computer or virtual private network by typing the password generated by the token into the prompt.

The card reader on the door constantly emits a Radio Frequency energy Field. When a card crosses the field, the power from the field energizes a copper wire inside the card, which powers the chip containing the card number and any other unique data.