Access_Control_System_Overview
Access_Control_System_Overview
Access Control
Access control is a technical method that requires authorization to enter facilities or specific
areas within a company.
This authorization serves to protect individuals, assets, or information and applies to:
Authorization for access involves three key methods of identity verification in compliance
with access control standards:
Legal Obligations
3. Safety Standards
Access control systems must comply with fire and life safety standards:
- Ensure no obstruction to emergency exits or evacuation routes.
- Integrate with Fire Safety Systems (FSS) as per regulations (e.g., fail-safe unlocking during
fire alarms).
Implementation Methods for Access Control
1. Manual Access Control by Guards:
- Visual Recognition: Guards verify personnel visually.
- Badge Verification: Guards check identification badges, including photo ID or access
passes.
2. Credential Technologies:
Access credentials fall into three main categories:
- Mnemonic Codes: Passwords or PINs entered on a keypad.
- Cards or Tokens: Smart cards or RFID tags.
- Biometrics: Use of unique physiological traits.
3. Combination Authentication:
To enhance security, multiple authentication factors may be combined:
- Card + PIN.
- Card + Biometric.
- PIN + Biometric.
Authentication Devices
1. Keypads:
- Allow users to enter PIN codes for access.
- Regular PIN updates are recommended to mitigate risks of credential compromise.
2. Card Readers:
- Contact-Based Cards: Cards with magnetic strips or chips requiring physical contact.
- Contactless Cards: Use RFID or NFC technologies for proximity-based authentication.
- Contactless systems are preferred for their durability and ease of use.
3. Biometric Readers:
- Analyze unique physical or behavioral traits such as fingerprints, facial features, or iris
patterns.
- Ensure compliance with privacy regulations for the storage and use of biometric data.
Advanced Features
1. Anti-Passback:
Prevents the reuse of credentials to allow unauthorized access:
- Real-Time Anti-Passback: Requires the badge to be used in sequence (e.g., entry then
exit).
- Timed Anti-Passback: Prohibits badge reuse within a set time window.
2. SAS Effect:
- Used in dual-door systems to enhance security. One door must remain closed before the
other opens, commonly implemented in high-security environments.
2. Security Levels:
- Level 0: Open access.
- Level 1: Requires PIN.
- Level 2: Requires card + PIN.
- Level 3: Requires biometric verification.
4. Scalability:
- Design the system to adapt to organizational growth, such as new personnel or
additional access points.
Conclusion
The success of an access control system relies on thorough planning and adherence to
security, privacy, and safety standards. Key points include: