Access control - market sectors

Access & Identity Management Handbook 2004 Access Control & Identity Management

Audio and video-entry systems

Audio and video-entry systems are widely used in the household sector and in smaller non-domestic locations. An electronic strike lock is operated remotely by the person identifying the caller. A video element can be used to combine verbal interrogation with visual recognition. Being non-automatic, these systems are not suited to locations where there is a high throughput of people, or where 24-hour access is needed and cannot be monitored.

Biometric systems

Biometric systems identify individuals by means of personal characteristics, often fingerprints or hand geometry. Other characteristics that can be used include voice pattern, iris pattern, dynamic signature recognition, retinal pattern, vein pattern and face recognition. Biometric systems are highly accurate and are able to cope with day-to-day variations caused by minor injuries or colds, etc. When a biometric system is installed, the sensitivity of the system must be set to avoid erroneous lockouts while maintaining security.

Biometric systems have the advantage that there are no cards or tokens to be mislaid. They are difficult to cheat because you cannot borrow, copy or steal another person's physical characteristics. These systems are most effective where there is a known group of personnel whose statistics can be read into a database for later comparison. Biometric systems are not useful for granting access to visitors who are not already on the database.

A biometric system is usually the most expensive option, but prices have fallen considerably in the last few years.

The systems can be demanding in terms of data storage. One solution is to record the biometric template for each user on a smartcard. When the user wants to open a door, he has to allow the system to take the biometric measurement (scan the finger, for example) and then he presents the smartcard for comparison. Thus, he proves he is the legitimate holder of the card. There are various security measures that can be used to ensure that only cards generated legitimately by the system can be used. Smartcards can double for other smartcard functions. The reduction in smartcard cost makes this a feasible option, although it does negate the advantage of biometric systems, which have no cards to be carried and possibly lost.

Card systems

Card systems involve entering a card in a card reader. Adding the photograph and details of the authorised card bearer enables any access-control card to double as an identification card.

Several different card technologies can be used for access control. The main ones are as follows:

Bar code

This is a very inexpensive option but duplication is possible and the amount of information that can be stored is low. Bar codes are useful for low-security applications and short-term applications, such as entry to exhibitions. Infrared bar codes and readers can also be produced, using codes that are not visible to the eye. These have the advantage of being more difficult to reproduce.

Barium ferrite

This is the oldest card-system technology. A sheet of barium ferrite is encoded during manufacture and embedded in the card. Cards cannot be copied but are thicker and heavier than other types. They cannot be kept in a wallet with magnetic stripe cards because they can corrupt them. Barium ferrite tends to be superseded by the Wiegand and magnetic stripe technologies.

Dual function

As an organisation expands, it may adopt more than one access-control system. It may want to be prepared for smartcard functions in the future. One solution can be to use two technologies on the same card. A combination of the Wiegand and magnetic stripe technologies is sometimes used for sites that have both high-security and low-security areas. A smartcard that includes a magnetic stripe is also a possibility.

Magnetic stripe

Magnetic stripe cards are cheap to produce and widely used for low- to medium-security applications. They are not prone to accidental erasing, but the cards do deteriorate with wear. They also have a fairly limited data-storage capacity.

Smartcards

Smartcards include a microprocessor, which stores information about the holder. Smartcards offer high security and the same card can serve many other functions, as well as access control. The two main categories of smartcard are contact and contactless.

Wiegand cards

Specially-constructed Wiegand wires embedded in a card induce a current in the coils of the reader. This technology is highly secure, being almost impossible to duplicate. Wiegand cards are very durable and not affected by external magnetic fields.

Digital keypad systems

Digital keypad systems comprise a user terminal with a series of numbered pushbuttons or a touch-sensitive pad, linked to the lock release mechanism via a control unit. The control unit is pre-set with a personal identification number (PIN), which unlocks the entrance when the same number is keyed into the terminal. The PIN can usually be changed at any time.

Keypads are widely used in flats, schools, offices and leisure centres. They can be used in conjunction with card readers in more complex access control systems. To avoid the risk of watchers learning the sequence of numbers, there are randomised scrambler keypads, on which the digits appear in different positions each time the pad is used.

Proximity, long-range and hands-free systems

The proximity reader picks up radio frequency (RF) emission from a card, key or token, which has to be placed touching or, in some systems, near to the reader. There is less risk of wear than with other systems. Proximity and hands-free systems are more accessible to people who have some manual disability because there is no card that has to be inserted into a reader. Systems also allow a much faster throughput of people, so they are useful for busy locations. This type of system is sometimes called passive proximity because the card does not need to be equipped with a battery.

Hands-free systems use a reader that can accept an RF token at a distance. The token may, for example, take the form of an identification card, worn as a pendant or on clothing. These systems are useful when staff need to pass in and out frequently, especially if they are carrying equipment. The reading range can be up to 10 metres depending on the application. This technology is similar to proximity systems but the cards or tokens need to be equipped with an internal battery. This type of RF access control is sometimes termed 'active proximity'. Vehicle access-control systems involve the use of a barrier, such as a lever bar or gate. Some are RF vehicle tags for long-range reading, while others require the driver to insert a card in a reader.

Token-based systems

These are designed to allow entry when a pre-programmed card is inserted or swiped through a slot in the terminal, or when a pre-programmed token is placed in close proximity to the terminal. These so-called proximity readers combine considerable reliability and durability with ease of use.

Online systems

Online systems generally provide realtime management facilities, including the ability to add, delete or amend levels of authority, with graphic and text displays for ease of operation. A range of reports can be generated to provide details of current or historical events, enabling access control systems to fulfil additional needs, determining occupancy if it becomes necessary to evacuate a building in an emergency, or discovering who went where, when and for how long for investigation purposes.

Conclusion

The terrorist attacks on the US on 11 September 2001 has given a boost demand for security products and services generally, and has tended to give security installations a higher priority when budgets come up for approval. Whether the access-control market in SA has yet received much of a boost from the fears of terrorism is doubtful. Also, much of the customer base for access control is unlikely to feel threatened by terrorism. However, this influence is likely to help to boost demand from the high-security end of the market in the future.

Biometric systems are now becoming well established in SA and although high security sites account for most demand it is expected that the customer base will spread to medium-security applications as the prices continue to fall. However, contactless smartcards are seen as the next high growth sector and will eventually erode sales of proximity systems. Contactless smartcards offer all the advantages of proximity and can be used for additional functions. Hands-free systems tend to be used for specialised locations, where fast throughput is important. They require long-range readers, which means that the sector is not threatened by contactless smartcards and demand will remain strong.

Brian Barnes
Brian Barnes

Brian Barnes is a security technology specialist, he can be contacted at Hodari Security Technologies, 082 973 8295.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...