Access control and management systems

Tomcat

Professional
Messages
2,383
Reputation
4
Reaction score
410
Points
83
Access control systems are usually combined into a common complex, which is controlled by a computer, executive (gateways, turnstiles, locks) and software and hardware (readers, controllers) means, and of course identification means - magnetic cards (HiCo - high-coercive), smart contact-cards, Wiegand cards, contactless Proximity cards, Mifare, Em-marine, Hid or Indala.

If necessary, user identification can occur not only by reading information from the appropriate storage medium (magnetic card), but also by checking biometric data (fingerprints or retina).

Since access control systems perform the functions of automated access control at various levels, a large amount of information must be processed, and the systems themselves must be reliable in their operation, regardless of the size of the information received at the terminals. In addition, personnel passage must be carried out without loss of time, and records of personnel movement, access, etc. must be taken into account.

The principle of operation of access control systems is quite simple - all personnel are issued a plastic card with an individual code contained on it. Special reader devices are installed at the required points, receiving information from the cards and transmitting it to the system, where the information is processed, and in accordance with the access level of the cardholder, the system makes a decision - turning on an alarm, switching the premises to security mode, allowing passage. Naturally, all information from the readers is recorded, and if necessary, you can get a full report on the movement of a particular employee throughout the enterprise.

Since the cards are practical and durable passes, they can be printed with the owner’s photograph, his last name, first name and patronymic, position, department or any other official information that allows the security service to correctly identify the owner. The role of an identifier in plastic cards is usually performed by ferromagnetic wires implanted into the card (Wiegand cards), a magnetic strip with information recorded on it (magnetic stripe cards), or a chip implanted into the card (Proximity or smart cards).

To sum up, we can say with confidence that equipping an enterprise with an access level control system solves several problems related to security at the enterprise, and, accordingly, is an indispensable means for ensuring the proper level of security, in most cases maximally eliminating the occurrence of emergency situations or leakage of important data.

(c) https://card-online.ru/articles
 
Top