marți, 22 octombrie 2013

Denying/Authorizing Entry to Files or Offices: Ways Access Control Cards Work - Business

The concept of access control, according to security experts, refers to the ability to permit or deny the use of a particular resource by a specific individual, or entry to a specified area. In denying unauthorized individuals access to files or to a specified location, control mechanisms are installed or placed to properly manage a physical resource. An example of this would be a movie theater, with the tickets being the main access or entry pass, so those who are not holding tickets will surely be denied entry. Access control will also be applicable for electronic or digital systems, whereas a private text document or file on a computer will only be available or made readable to certain users. An access control card is basically a device that is utilized for gaining entry to an area that has electronic entry/exit points established. The access control points could be designed with a gate, steel door, parking gates, ramps and other barriers.

Most industries and businesses today utilize access control cards that employ a wide array of technology used in identifying the holder of the ID or badge to an access control system. Security and electronics experts say that the common technology used for these cards are bar code, smart cards and other digital security equipment. The access control ID will be embedded with a number that will be read by a digital card reader. After this, the number is then sent to the main access control system or database, where a central sensor makes the decisions based on the information shown about a person's credentials. If the information shown on a specific card is included in the main access control list, it will then unlock the identified access point and allow entry to the individual. This transaction is then entered in the system for storage and possible retrieval, and a report may be generated to list or reveal the identities of those who entered a certain access point at any g iven time.

A common electronic access control system usually uses computers to help ease the limitations of standard mechanical locks or metal keys. In these types of access control mechanisms, a person's entry is curtailed depending whether he/she pays for a ticket, has gotten approval from his superiors, or has obtained the proper documents and others. The major access points in an establishment may be constructed to allow entry only, or they could be made in such a way that they be used for both entry and exit points. Security guards, doormen, checkers and other personnel may then be tasked to man these entry points, along with the setting-up of turnstiles and other physical devices. Fences could also be used to avoid the circumvention of the access control system, and this would be useful for very large areas. Some systems also use the personal identification number (PIN) technology. A PIN would generally consist of four to eight digits, and experts say that the benefit of using this system as an access control mechanism is that once the number is memorized, the specific access number cannot be lost or left somewhere. However, there are drawbacks to using this system. Some say that it can encounter difficulties if ever a person forgets his specific PIN number, or in the event someone else sees or finds out the PIN of the authorized individual. Some also view the PIN system to be less secure than smart cards, bar code or magnetic stripe cards.

At present, there are a number of access control card, ID, badge and software security manufacturers, producing products that range from badges that use standard bar code technology, magnetic stripe, contact-less smart cards and other related devise that could also be used for cashless vending, online payments and OEM product usage. They are also able to provide consultancy services, and assist in the setting-up of the access control points, as well as system design services and installation of a secure data storage system for all records.



access point vs router

Niciun comentariu:

Trimiteți un comentariu