Thursday, February 11, 2010

Types and models of Access Control System, aryah.net

BIOMETRIC FINGERPRINT ACCESS CONTROL SYSTEM

Aryah.net is committed to provide the best ACCESS CONTROL SYSTEM.

In recent times, there are large numbers of Biometric Systems that are commercially available. Such Biometric systems are based on unique characteristics of human being. The most common, reliable and successful system is the one based on Finger Prints. Users are supposed to put their thumb/index finger (or any specified finger) in the finger reader. The system then compares the finger print that is read with that in the central database for authentication.

Most of the Biometric Systems do not keep an image of the fingerprint but a template. A template is basically a number that is calculated based on various characteristics of the fingerprint. Such an approach is desirable so that unauthorized persons may not sneak in unauthorized images of finger print in the database. When a Finger print is to be matched, it’s ‘template’ number is computed and compared with that stored in the database. Most systems allow for dry, greasy, chaffed and minor cuts on the fingers. The other biometric systems are based on ‘Retina of the eye’, Palm, photograph or voice pattern recognition. The Palm based systems take the image of the palm from various angles and compare the same. The system that is based on Finger Prints is most popular and economical.

PROXIMITY ACCESS CONTROL SYSTEM

The core of Proximity system is the Proximity Reader and Proximity Card. There are two types of readers in the market – One that has an inbuilt controller with capability to authorize access with or without being connected to a PC. The other kind requires a PC to be connected at all times.

Depending upon the configuration of the premises, one or more readers may be used. If more than one reader is used then it is called a Networked system, which is usually connected to a PC. Some systems use a 8 core or a 16 core wire for connecting all the Readers while some systems use only 2 core wire, thereby reducing the cost of wiring and maintenance.

The better systems have readers that can be used interchangeably in a standalone or a networked configuration. Also, some systems have bulky controllers attached to the readers that require a separate source of power as well as add to the cost. The current day readers have built-in controllers and can be directly connected to a PC.

Another use of Proximity systems is to record attendance for employees. For recording attendance, minimum two readers are required – one for IN and one for OUT. The employees are supposed to show their cards to the appropriate Reader upon arrival or exit. These transactions of IN and OUT are recorded in the attached PC. From the PC various reports can be printed.

Most of the Access control systems come with readymade attendance software as an option.

The advanced Proximity Based systems come with inbuilt Password Based system too. It is possible to specify if the employees can enter using Password alone or Proximity Card alone or both are required. Such an option gives additional flexibility to define the Access Policy for the organization.

PC BASED ACCESS CONTROL SYSTEM

The systems currently being offered in the market come in with variety of features to cater to different types of requirements. Along with the basic security functions of validating and controlling access, the PC based systems offer optional features like Time and Attendance, MIS Reporting etc., providing the management with a lot of value- added benefits. Some of the most useful features include:

Multiple entrance/exit monitoring. The capacities ranging from a few users to hundreds of users – easily configurable for organization of any size.

The system can interface with the personnel information files that may be there already in a computerized environment. This makes the installation quick and reduces the data-entry errors.

Flexible Time zones – highly useful for controlling entry / exit as per shift timings; basically, the PC based systems offer the possibility of programming the rules of entrance and exit.

PC based systems are very user friendly and offer unmatched flexibility in setting up various parameters.

PC based systems also keep the record of the transactions on the hard disk for extended periods of time.
User selectable personal identification numbers – provides additional security.

GENERAL FEATURES

  • Relay output for connection to door strikes/latches
  • Independent NO/NC (programmable) input for connection to a switch for opening the door from inside.
  • Elaborate Audio and Visual signals in response to commands
  • Programmable duration for Time to open the door and Time to close the door, if connected with a magnetic switch
  • Tamper switch output separately available

No comments:

Post a Comment