Access Control is the means of controlling access to areas subjected to specific individuals or groups. Typical access control systems incorporate the use of ID cards (proximity, magnetic, or biometric), which allow users to gain access to specific doors within the premises. That card has the potential of being used at multiple sites in any geographic region designated by the organization. When a card is presented at the reader the reader communicates with the access panel, which has many different functions. The ability to set time zones, user privileges, and access levels, this is all done through a software interface which communicates with the access panel.
There are many configurations on an access control system; the time zone function allows the administrator of the system to assign times for when and where a “user” has access. An example would be normal working schedule of Monday through Friday 8am to 5pm for normal users. The other time zone could be an after hours schedule which would be Monday through Friday from 5pm to 8am, and have one for Saturday and Sunday as well. This allows them to configure times when it is ok for users to gain access to certain set of doors during specific times.
User privileges are very important when administering the system. There are many fields to associate the person who holds that card. Some of those fields are Name, ID#, Job Function/Location, Pin # if any, Address, Phone, Email and many others. These fields enable administrators to identify individuals as they are trying to gain access to any area within the controlled access areas. They also allow for detailed reporting under the reporting section.
Access levels are a feature of the Access control system which allows the administrator to give or take away access to specific areas. The can be very simple or very complex depending on the nature of the system and how critical the application is. An example of access levels would be “Managers”, as part of this access level you have rights to enter and or exit certain doors which are designated by the administrator and not available to the “regular” employee.
These are the functions of the Access System through the software suite. However, there are many other components to the system which incorporate Biometrics. There are many different types of biometrics involved, some of those are fingerprint readers, hand geometry and retinal or iris scanners. These types of readers are usually placed into highly secure locations as they require an additional level of security.
Fingerprint readers are readers that have fingerprints enrolled onto the device where the reading will be done. They sometimes also have a pin pad to ensure double security. The user would put his/her finger on the reader and then if need be would enter there pin#. This along with the other technologies provides a means for tighter security. If a user simply has an ID card which they use to gain entry and that card is lost and not deactivated immediately the person who holds the card has access to the facility. In the case of biometrics the fingerprint can not be lost. From an administrative standpoint where time counts are questions for attendance, someone can not present another persons card just so they are not late for work. It has many benefits, but also has some drawbacks. In Harsh environments users fingerprint may get worn or dirty which could lead to false reads and deny access even with pin #. This leads us to Hand Geometry readers.
Hand Geometry readers are a little easier in harsh environments because it is not actually reading fingerprints. The reader will scan your hand and distance of all the fingers to the palm and provide a approval percentage. As you read your hand more and more the system begins to have a higher percentage of approval. This is a very reliable reading system for gaining access to a facility or room.
Retinal and Iris scanners provide the highest form of security and are usually used in the most tightly secure areas. Many Research and Development areas have these in place as the information they have “locked up” is very critical and not just anyone should have access.
Access control in whole has become a very common part of our lives, if you work, most likely you have an ID card to allow you access into your place of work. This allows employers not only to have accountability, but it also protects the employer and employees from unwanted visitors.
That’s it for this week; see you on the next blog.
Kal
Saturday, August 15, 2009
Access Control and Biometrics
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment