Control panel process in access control
Physical Access control system can be manned by a person where payment for entry systems could be in place. There may be a section that requires one way traffic of people, this can be enforced with a few different methods like a doorman, a border guard or a ticket checked. Extra Access control system could be put in place, Turnstiles being a good example of this. Fences can also be used, this well help avoid circumventing this Access control system
A control panel will be the main processor of this operation and they are highly reliable, Information is sent to the control panel when the required item is presented at the other end of the Access control system (a credential presented to a reader) the information contained on the credential is taken by the reader and sent through to the control panel. The control panel holds an Access control system List, this contains all the information of credentials to be permitted access and those to be denied. It compares the data from the scanned credentials, sends a transaction log to the database where it is stored and access is either granted or denied. When the Access control system List receives the credentials information, the door will remain looked if access is denied. If Access is granted a relay is sent from the control panel to the door unlocking it. An indication of weather access has been granted or denied is usually given by means of an LED, Red will show you have been denied access and Green will show you have been permitted access .
A credential can be a number of different things, it is something you know or have such as an access badge, a PIN or number, a biometric feature (a fingerprint or eye scan), it could even be a combination of these.
However this can be bypassed and is not always 100% safe, for example an authorised member of staff could pass their credentials on to an unauthorised member of staff hereby rendering the Access control system ineffective. A way to protect against this happening is to use two-factor authentication. Two-factor authentication requires another form of verification in addition to the credentials. This identification could be a second credential, a PIN, operator intervention, but the most effective is a biometric input.