Access Control System

Access Control provides the ability to control, monitor and restrict the movement of people, assets or vehicles in, out and around a building or site. Access Control provides ‘owners’ with the ability to protect their people, assets and intellectual property. Unlike old-fashioned methods such as a lock and key, Access Control provides not only security but also a record of events that have occurred. It also offers the unique identification of individuals or goods entering or leaving controlled zones within a building or site. Access Control should be considered wherever there is a need for restriction or control of access. Typical applications include: staff and visitor movement around an office building or site; the controlled movement of assets in, out and around a building. Examples include the entry of personnel into secure areas, the movement of patients, staff and/or visitors around a hospital, or the control of entry into car parks.

Product Options for Access Control
With continuing developments in technology, the variety of products for Access Control has improved to meet the specific needs of the market. Access Control systems can function as stand alone or on-line systems connected to an operator station. Products range from token-based systems, digital keypads, through to biometric identification systems.
Product Integration
The increasing complexity of security requirements and the improvement in flexible technology solutions available has led to the integration of Access Control products with other security systems. Access Control systems offer interfaces to Alarm Management, CCTV, Video Badging, Time & Attendance and Building Management systems, amongst others.
Token-Based Systems
Token-based systems combine security and convenience to offer solutions for applications including: building or site security, asset tracking, patient protection and vehicle identification. Available token technologies include: Proximity, Hands-Free, Magnetic (Stripe), Wiegand, Biometric, Smart Card or indeed a mixture of these, depending on the system requirements and capabilities. In areas where additional site security is required, token readers may also be used in conjunction with Keypads to provide PIN and token combinations.
Digital Keypads
In this case the token is simply a numeric code entered into a keypad on or near the door. Codes can usually be set to different lengths and most keypads have the capacity for more than one code.
Biometric Readers
Biometric systems are used where the highest security is required, or specific personal identification is critical. In these systems it is a particular aspect of the human physiology that is stored (eg voice, finger print, palm print, iris or retina), and this stored value is then compared against the person whenever access is requested.
Audio/Video Entry systems
Audio (Intercom) or Audio + Video combination arrangements may be deployed where human control of access is required from a remote control point. These are popular in receptionist or security guard environments, allowing direct human control over entry to selected areas.
On-Line Systems
On-line systems generally provide real-time operator management facilities. Systems offer graphical and textual display facilities, allowing easy operator control. Multiple selectable reports are available to provide site managers with real-time as well as historical reports of chosen incidents. It is normal that multiple operator positions may be interconnected on industry standard local or wide area networks. On-line systems are equipped with password control and hierarchical operator authority levels giving the option of full audit trails.
Integrated Systems
The growing nature of sophisticated Access Control systems make them ideal platforms for integrated systems, providing total security management, Time & Attendance capabilities, CCTV management and video badging to allow the use of video verifications. These may be provided on the same operator position as the primary access control function, or on separate networked workstations, offering dedicated facilities to selected operators.
Access Points
Access Control devices may be used in conjunction with a variety of different entrance arrangements, not only with traditional doors. Common modes of use include turnstiles, barriers, gates, rising barriers, elevators and double door arrangements.