Access Control: It’s not just cards and keypads April 5, 2017

Access Control: It’s not just cards and keypads

Not too long ago Access Control meant having your keys, giving someone access meant giving them a copy of the key, and if the setup was truly sophisticated, then there were individual keys and a master key.Key in a lock

As great and reliable as that system was, it left much to be desired:

  • Scheduled Access
  • Revoking Access Privileges
  • Preventing Key Duplication
  • Revoking Access for Lost Keys
  • Granting Temporary Access

Keycards

Key-card

Keycards were a revolutionary invention. Whether Wiegand, magstripe, punch-hole, or the latest in proximity cards and RFID, locking systems have been transformed into Access Control Solutions. For the first time ever personnel who had their access privileges revoked didn’t have to surrender their keys to be physically barred from entry. Lost keys were no longer a problem. Neither was unauthorized key duplication. The system administrator could activate and deactivate cards at will.

Punch-Time-Clock

Now schedules could be created limiting entry to particular days and specific times of the day. The system could even be left open during business hours and only require credentials after hours. Personnel could even be issued with one time use (disposable) cards which expired after a specific amount of time.

The systems even expanded to a point where multiple facilities could be managed from a central control facility and the same credentials (card) would allow access to multiple, geographically diverse locations.

The latest versions even host the information off-site in a cloud solution alleviating the client from having to maintain their own computer systems to manage the access rights, and allowing rights management from the convenience of a smartphone app. Contact us for more information…

Numeric keypad

Pinpads / Keypads

By shifting away from cards to individual employee pin codes Access Control Systems were able to simplify access management by alleviating the need to distribute keycards, and deal with lost or broken cards.  Contact us for more information…

Biometric fingerprint scanner

Biometrics

As convenient as they are, even keycards are being replaced as more convenient identification techniques become more prevalent. Biometric readers, rely on physical characteristics of the person rather than a card or a key to identify them. Retina prints, fingerprints, the shape of the veins in a person’s hand are all unique enough to allow positive identification, and relieve the client from having to carry another card, or keyfob. There is also no concern that the token will be, lost, stolen, broken, or loaned out to an unauthorized party. Contact us for more information…

August <tm> lock screen on an iPhone.

Alternative Entry Tokens

The newest entries into the Access Control field are focused on speed and convenience. All of the control and management software can be stored on a hosted cloud. Access rights, schedules and temporary permissions can be managed through a cell phone app. They also offer alternative identity verification schemes focusing on speed and convenience. Contact us for more information…
Bluetooth Symbol

Bluetooth

Smartphones equipped with Bluetooth™ can be paired with access locks to grant access as soon as you approach. No fumbling for your wallet or rummaging through the purse. No lanyards or keycards. As long as your phone is on you, access is granted. Best of all, you don’t even need to slow down as you are approaching the door – the lock will disengage as soon as your phone is sensed. Contact us for more information…

Computerized map of a man's face

Facial Recognition

Facial recognition technologies can identify an individual from “looking” at their face. Most of these systems still require the person to stand relatively still for a few seconds while the computer scans their face. However, the latest systems are capable of detecting an approaching figure – even in a crowd – map their face, and make a lock/unlock decision while the person is walking towards the door. You don’t even have to break your stride as you are approaching the door. Contact us for more information…

Recap

Modern access control systems allow numerous advantages.

  • Being able to schedule individual access times
  • The doors can remain unlocked during regular business hours, and lock automatically on a pre-set schedule
  • One time permissions can be granted to contractors or maintenance staff, as needed
  • Fast decision making ability and convenient choice of identification techniques
  • Being able to avoid the costs of maintaining servers to manage access data
  • Permissions can be rapidly revoked
  • Bluetooth, facial recognition, and biometric systems relieve the need to maintain inventory of security tokens
  • Can be managed form the convenience of a cell phone
 
Review Pros

RATINGS & REVIEWS

See More Reviews of EZ Switch on HomeAdvisor