vineri, 6 decembrie 2013

Access Control - Multi Use Function that is Useful in Many Businesses

Access control is defined as the ability to deny or allow entry to a specific resource or area of a group, business or organization. A control mechanism is put in place to allow or deny access to a resource or physical area. Examples of the control may be a door, gate, or password login on a computer. Access control may be used for entrance to an entire physical location or system or it may be placed on something small, like a text document. Some access control systems use a card to allow access. The card entry method into a secure area usually is monitored by use of an electronic entry/exit point such as a door.

Businesses that utilize cards to monitor and authorize access control use a wide variety of methods to identify the card holder. Technologies that may be used on the card include bar cords, proximity cards and mag stripes. The card will have a number embedded on it by using one of the methods listed. The number is scanned or read by a card reader and th e information is transferred to the main access control system for review. The sensor in the system matches the transmitted information to the database to determine if access has been granted by the system operator. If the submitted information matches the database, the card holder is granted access and the system will unlock the access point to allow entry. The transaction is logged into the systems transaction logs and can be reviewed by report as needed. Specific reports can be generated by the system for specific timeframes to provide use information for managers and specified personnel.

Computers are utilized with most electronic access systems to provide additional security not available with the standard mechanical locking systems. Entry to areas monitored by computers may depend on payment, management authorization and other criteria set by system operations. The control system can limit entrance and exit capabilities if needed. The size of the group desir ing entrance may require the use of other security measures as well. Doormen, security guards, turn styles, fencing and other products in the security field may be needed to insure appropriate security levels are maintained for the situation.

Some security systems use the personal identification number technology (PIN) for secure access. The number, usually four to eight digits long, provides a control mechanism to access systems. The PIN systems flaws include the inability of pin holders to remember their number and the unintentional ways that others can access secure PIN numbers.

Many manufacturers currently product access control components, security control products and ID card printer systems. To provide secure access to physical areas, vending, online payments, network access and product usage, systems are needed. Manufacturers and their distributors will provide recommendations, consultations, system design and installation for various control pr ojects.



access point vs router

Niciun comentariu:

Trimiteți un comentariu