Access control and Identification: what it is and what it means Many users often speak about electronic access control systems and identification without really knowing in detail what they are talking about. However they base their decision in which system is the best for their needs on this knowledge. Often this results in an oversized system with the wrong ID technology. Each technology, starting from the simplest keypad up to the complex read/write system has its own application domain. Therefore we feel that some explanations in this field will be very welcome. A word about identification All electronic access control systems have 1 main function: identifying a person before deciding to unlock the door. The identification method used can be divided into three categories. 1) PIN-only systems These are the least secure. And even here, a subdivision can be made. Systems with a single common code where everyone uses the same number are the cheapest and least secure. Slightly better are unique PIN systems, where each person has a different number. Here at least you can sometimes delete a single user code if it has become unreliable. But still the risk remains that a code is passed on, deliberate or accidental, and little way of retrieving what happened. 2) Token-based systems The choice of card technology can be very confusing at first, but each technology has its own characteristics and pricing and therefore its own applications. Basically, there are two types: swipe cards that need to be inserted or swiped through the reader, and those where the card is read at a distance. This second type is mostly short range (i.e. proximity) working from 10 cm up to 60 cm. 3) Biometric systems Biometric systems are only at this moment, after being available already for several years, starting to find some minimum kind of acceptance in the security market. The most popular in terms of cost, accuracy and acceptability seems to be fingerprint recognition. But also facial recognition iris recognition is available on the market. Quite often these systems are not as rapid in terms of identifying the user and offer a poor price/performance ratio. As a result, this type of systems is only finding its applications in the high security domain. 1) Card or tag The choice of technology will be based on cost of readers and cards, the level of security needed and the personal preference. Sometimes there is a pre-existing reason for choosing (e.g. if time and attendance cards have to be used also for access control). An overview of the different technologies with their costs is shown below: 2) Reader Some readers are less vandal-proof than others, but mostly the reader does not carry any intelligence or door opening devices. Attacks on a reader will therefore very rarely result in unauthorised access, but only in a damaging of the reader. Proximity readers offer the option that they can be installed hidden behind panels so that there is no way to get hands on them. ProxTech readers: from left to right: OEM module, Mini, Mini/K and MCR If there is a need to control both entrance and exit, two readers are required, one on each side of the door. This offers the possibility of knowing everyones whereabouts at all times, but then you will have to keep in mind that every employee will have to pass his card each times he passes a door, even when this door is kept open by a colleague 3) Controller 4) Software Software will also be very useful for monitoring and recording events (e.g. who has passed where and when), saving the information and creating reports. 5) Lock 6) Door sensor 7) Egress Of course this is only acceptable when passing from a secure area to a less secure area. Pushing the button causes the lock to be released, just as if a card had been entered. A commonly used application for this is a button at the receptionist to let visitors enter a building 8) Door Ajar Sounder Different types of System A quick word on the most commonly used types of systems on the market: 1) Stand-alone single door systems Figure: ProxTechs PL1000 system The highest risk with this kind of products is that the intelligence, i.e. the place where the decision is taken and the door opener is activated from, is on the insecure side of the door, and therefore liable to attack. Some better systems, e.g. ProxTechs PL3000, offer the possibility of fitting a non-intelligent slave reader on the insecure side and the controller unit on the secure side of the door. 3) Networked systems Conclusion At ProxTech we have decided to make this decision a little bit easier. As in most cases people first select the type of system and the controller and then are bound to take up the card technology that is supported by that system, this often results in the wrong card technology being used in that specific application. ProxTechs entire ProxLine range of card readers is however available with a wide variety of interfaces, so they can be connected to almost every controller. Now you can freely make your choice of card technology (or use the same cards as youre already using for e.g. time and attendance) regardless of the rest of the system. Of course, sometimes this will require some investigation, especially when the data format on the controller in not known. But then our engineers will be at your service to assist you in a very efficient way. Contact Details: bvba ProxTech International Tel: 3 722 91 60 E-mail: |