Tuesday, July 29, 2014

Access Control: From Keys to Cards to the Uniqueness of You

Remember when access control was limited to fitting a key into a lock and turning? You know the drill. You probably used one to lock your door this morning, and you'll  use it again when you go home this evening. Turn it one way you retract the deadbolt that holds the door closed and gain  access. Turn it the other way, you fit it back into place, denying access to anyone without a key.

The First Lock and Key
The first key unlocked the first lock close to 6,000 years ago in Egypt. The Egyptians used a very simple wooden locking mechanism composed of several small pins inserted into a wooden bolt close to its locking slot. When the pins were in place, gravity held them down, locking the bolt.When a small wooden toothbrush-type key was inserted, it reached the pins and raised them, unlocking the bolt.



This rudimentary locking mechanism was a good first step to access control but it was vulnerable to blunt force and the key was heavy and bulky.

Locks and keys have worked for us through the ages. They are easy to install, universally available, and offer simple secure access control. But they are hardly ideal. Who among us has not lost a key? Keys can break off in the lock if too much pressure is applied. Then you need a new key .....and maybe a new lock.
And there's no way to revoke a key's "security clearance." When a roommate moves out you can't take her off an authorized list nor can a new home owner or renter be certain they hold the only keys. In all these instances, security demands getting the lock changed. And with it comes a new set of keys.

Access Cards

Keys and  keyholes may still be sufficient for residential use, but are all but obsolete at most workplaces, having been replaced by IP access cards and card readers. But cards, too, are going through a flux of change.

Barcode

IP door access controlA bar code is made up of a pattern of lines and spaces of varying widths and sequences. 
It may or may not contain alpha - numeric characters. The information contained in this computer code is scanned into  memory and resides on the card. When presented to a barcode reader at an entryway, it will unlock the door if the employee seeking access is authorized.

Bar codes were the first type of code to be used in access control. They are easy to create, simple to use, and cost little to produce. In fact, a user can print his own barcode using a PC-based application and apply them to blank cards and badges. This plus is also a minus. Since the barcode is there for all to see, anyone who sees it can reproduce, or counterfeit it. One way to get around this fault is to cover the barcode with opaque film of some sort,so that it must be read with a UV bar code reader but this adds to the cost.



Magnetic Stripe
When most people think of swiping a magnetic stripe, they think of their credit card. Swiping a magnetic access control card is no different The magnetic stripe, actually a piece of coated magnetic recording tape, holds information that identifies the holder as someone authorized to enter the facility just as a credit card holds account information.





Magnetic stripe access cards and badges are one of the most economic solutions since they are easy to produce. However since swiping them puts them through the reader, they wear out and need periodic replacing.


Add to this the fact that they are easy to forge and you can see why, although they are good for companies requiring  only simple access control, they are not the answer for facilities with a need for tight security.



Proximity Cards

Proximity cards, like those used in IP access control systems, fill both the voids left by magnetic stripe cards.

They contain a microchip holding encoded identity and authorization data and an antenna to transmit it at the point of entry. When the employee approaches the door, he presents his proximity card, activating a so-called wake up field that powers up the electronics in the microchip so it can send the encoded identity data to the reader via the antenna.

The proximity card never comes into contact with the reader so it can last indefinitely. The reader, since it can be hidden inside the structure, is resistant to vandalism and tampering, making proximity cards a secure, durable means of access control.




Biometric Card

Keys, barcode badges, magnetic stripe and proximity cards all share a common security deficiency. They will permit access for whomever is presenting them whether that person is the rightful owner or someone who has stolen or found it. Biometric cards fill the gaping need for identity authentication.

The biometric card places the authenticating technology on the card. In many solutions ,a fingerprint scanner
resides on the card,  enabling the card, itself to read the cardholder's fingerprint in seconds. Users authenticate themselves right there on the card. If the fingerprint matches the encrypted fingerprint, the card system opens the lock, granting access.

Access control systems using biometric fingerprint and thumbprint authentication provide a higher level of security than systems that just verify a card anyone might be carrying. They do away with the possibility of a stolen or lost card being used for unauthorized access.



Biometrics in Development

While the fingerprint is the most prevalent form of authentication at the time, the technology is moving on, with facial recognition technology in the lead, as well a  futuristic-sounding solution  that can measure and recognize the card holder's gait as he approaches the reader. If all measures up the reader will unlock the door.
.

Can the day be far off when all we have to do is approach and request "Beam me up, Scotty."?





Kintronics is the place to call if you're interested in finding out how IP door access control and IP surveillance camera systems can keep your facility safe and secure. Call 914-944-3425 to speak to a sales engineer or just fill out an information request form.

13 comments:

  1. Bundles of thanks for providing such kind of blogs with the informative and impressive articles. security camera for business

    ReplyDelete
  2. Thank you for sharing such a informative resources, may I copy your blog "Access Control" into mine?? Know About Security Systems

    ReplyDelete
  3. Thanks for sharing, our community have an idea, to install few units on our
    Boom Gate
    front desk!

    ReplyDelete
  4. Iwatchs Holding, is a IP Surveillance and CCTV Distributor, and, they do provide Boom Gate, Auto Gate, Access Control, and Power Supply

    ReplyDelete
  5. Thank you! with your article, I roughly has an idea what to do for my office Access Control System!

    ReplyDelete
  6. Thanks for sharing! very nice explaination! Here I have found an article regarding Biometric Access Control too, just to share with you guys!

    ReplyDelete
  7. Hi Admin,


    I like your information. This post is really nice and informative. You tell all things in a best manner with few words.





    Fingerprint access control

    ReplyDelete
  8. Very Informative post, Access Control System is one of the best security system, we can use it in home and workplace too.

    ReplyDelete
  9. Thanks for sharing beneficial information of door access. Your blog article is really very nice and informative and please keep sharing.

    Vancouver home automation | Security vancouver | Best Security Vancouver

    ReplyDelete

  10. Door access control systems are used to grant authorization to persons/vehicles, thereby providing restricted access in and out of a concerned place. These systems are
    highly advantageous compared to the conventional locking and monitoring systems.



    door access control system

    ReplyDelete
  11. Door access control systems and magnetic card door lock systems give you "point of entry"
    security that is almost endlessly customizable -- very easily.
    Proximity access control systems These give you access to a single door or a series of doors without a lot of expense.

    door access control system
    keyless entry door
    electronic door lock
    elevator access control
    elevator keyless entry
    door locks

    ReplyDelete
  12. Hi, Thanks for your great post, there are much nice information that I am sure a huge number of guys and gals don’t know.

    Biometric Fingerprint Recognition Device

    ReplyDelete