New architecture takes the market by storm
by Heinz Roth

The new browser-based software generation is making strides into the access control sector. Outdated client/server structures are increasingly being replaced by modern browser-based solutions.

Through the use of new Java programming technology, there are additional customer advantages in terms of platform and operating system portability. For the user this means that new standards are being set that offer freedom of choice in terms of software supplier and complete integration in existing network technologies. Three-tier software architecture separates database structures and the application level from the user interface. Software that is developed based on these guidelines can be tailored to meet new system requirements.

Location-independent and workflow-based
Browser-based solutions are location-independent and do not need any special software to be installed on the Client PCs. These days, all users are aware that by using Internet technology, they can access data very simply from servers located throughout the world. Today, suppliers of modern access control solutions are taking advantage of and using these technologies. Workflows are created and enable all a customer's employees to use specific access control applications, without needing any special knowledge of the installation or the software.

Thanks to the open HTML source codes, users can also tailor the screen displays and contents to his own requirements while the application is running. Professional databases such as Oracle, IBM DB2, MS-SQL-Server or InterBase from Borland provide the basis for such software architectures.

Countless options
Another important factor is the availability of a range of software options to enhance a standard system, enabling it to grow as the user's requirements change. These include, for example, Visitor Administration, integrated card creation software as well as extensive alarm management. The best in class of such systems, offer browser-based graphical control centres, which display building floor plans and layouts in a clear and concise way. This is particularly relevant in installations with a security gatehouse. As a rule, locations are stored based on their actual geographical address so a user can very easily identify where a reader or a door is within the installation. If specific access rights have to be assigned, the corresponding door is selected by the town, address, even the floor of the building and in the background the corresponding access profile is generated automatically. Then the manager and/or the security chief have to give their approval. They are automatically informed by e-mail that a request has been placed and they can give the go ahead using workflow from any PC with an Internet access to the server. Everything else is handled by the system.

What does the future hold?
The continuing development of this technology will result in systems that require far less training than is often the case now, resulting in considerable savings both in time and money. The removal of the need for client installations shortens the system rollout phase and reduces later maintenance costs to an absolute minimum.

The most important benefits

  • Decentralised, workflow-based access right management

  • Centralised maintenance of all system parameters

  • No additional installation effort for the client PCs

  • Minimal hardware require-ments for the client PCs

  • Global data access

  • Freedom of choice of OS for the Client PCs

  • Freedom of choice of platform for the Server through Java technology

  • High data security through 128-bit SSL encryption

  • Standardised operator interface

  • Simple, user-oriented and configurable screen layouts

  • Unlimited scalability

  • Location and PC-independent client workstations mean that access can easily be established if one PC should fail

primion Technology AG,
www.primion.de