Access control system wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system also monitors the door and warns you if the door is forced to open or stays open for too long after the door is unlocked.
When the badge is presented to the reader, the reader sends the badge information (usually a number) to a reliable processor, the control panel. The control panel compares the credential number to the access control list, permits or denies the submitted request, and sends the transaction log to the database. If access is denied based on the access control list, the door remains locked. If the credentials and access control list match, the control panel operates the relay and the relay unlocks the door. The control panel also ignores the door open signal to prevent alarms. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two factor authentication can be used. In a two-element transaction, the provided credentials and the second element are required to grant access. Another factor could be a PIN, second credential, operator intervention, or biometric input.
Biometric access control system are security identification and authentication devices. Such devices use automated methods to validate or identify living individuals based on their physiological or behavioral characteristics. These features include fingerprints, facial images, irises, and voice recognition. Biometric devices have been used for thousands of years. Non-automated biometric devices have been in use since 500 BC. It was used when the ancient Babylonians pressed their fingertips on clay tablets to sign commerce. Automation of biometric devices was first seen in the 1960s. In the 1960s, the Federal Bureau of Investigation (FBI) began using fingerprints to maintain criminal records. The first system measured hand shape and finger length. Although this system was phased out in the 1980s, it set a precedent for future biometric devices.
Biometric data is used to create better and more accessible records of employee work per hour. With the rise of "buddy punches" (cases where employees lock out colleagues and fraudulently increase working hours), employers have sought new technologies such as fingerprint recognition to reduce such fraud. Employers also face the challenge of properly collecting data such as entry and exit times. Biometric devices are a reliable and reliable way to collect data. Employees must be present to enter their own biometric data. Find More Details