Access control refers to the security strategy of restricting entry to a building or property only to authorized personnel. The original form of access control was the lock and key. The drawbridge across a castle moat is another early example of a perimeter security access control point. Today, access control applies to many industries, including computer information technology and software. When Protogetic uses the term Access Control, we are referring to restricting physical access to the premises by a person(s) or vehicle(s).
There two main categories of access control: Physical Access Control and Electronic Access Control, sometimes referred to as Access Control Technology.
Physical access control is very often achieved using security guards (military or civilian) who check identifications and either allow or deny entry into the premises. The most rudimentary example of physical access control is the bouncer at a local nightclub.
At larger, more secure locations, manned access control points not only check entry authorizations, they are also responsible for deploying security entrance products such as high security gates or barrier crash arm beams to prevent vehicle intrusion. In addition, security personnel often intercept, detain and arrest unauthorized intruders or attackers.
When a perimeter security entrance will be unmanned, electronic access control technology products can be installed to automatically identify authorized persons and even their vehicles. These products can be:
Key Card Readers
Pass Code / Combination Keyboards
License Plate Readers
Voice Recognition Programs
The International Standards Organization (ISO) and the International Electrotechnical Commission (IEC) are the governing bodies recognized throughout the world for defining the standards for access control technology as well as the plastic access cards themselves, sometimes referred to as “smart cards”. The most widely recognized smart card standards are:
Two-factor authorization is an access control strategy designed to deter or prevent the unauthorized use of a legitimate entry credential that has been lost, stolen or “loaned” by the authorized ID holder. In such an instance, while the key card allows primary access, entry is not granted and the door opened until a second form of identification is entered. Often this is a PIN code or a biometric requirement like an iris or fingerprint scanner or voice recognition program.
If this seems confusing, think of two-factor identification like your front door: It has two locks and requires two different keys to actually open them. Another analogy would be a “mantrap” security entrance. The first door of the mantrap opens and closes behind the visitor upon presentation of the first ID credential. The second door will not open until a second authorization is confirmed – whether by a security guard physically identifying the person/ID or by a second form of ID being analyzed like Voice Authorization or Fingerprint scanning.
Biometric access control products take physical body measurements of the individual seeking entry into a facility. These measurements are then analyzed by a computer database of possible authorized individuals to determine whether a match exists. If the biometric body measurements match, the door is opened. Biometric technology includes fingerprint readers, facial recognition, retinal and iris scans, voice recognition and hand geometry readers. A good every day example of a biometric reader is the Facial Recognition on the newer versions of the Apple iPhone.
Actually there are several standards -- each for a specific kind of biometric measurement, including but not limited to:
When it comes to high security access control products, Protogetic has what you need. We are the industry leader in protective design products. We have certified and documented security products across numerous categories, and ratings. Find the exact Access Control system you need in mere seconds using our detailed product filter. Stop wasting valuable time and visit Protogetic.com today.
Please provide the following information so that your inquiry can be processed. The Protogetic team representative will be notified.By submitting this form, you agree to share the above information with the manufacturer. Protogetic does not sell user data.