Access from afar

Access & Identity Management Handbook 2018 Access Control & Identity Management, Asset Management, EAS, RFID

It’s more than a little frustrating when you have to go the extra mile to gain access to a building or facility. How many times have we seen people getting out of their vehicles to press a button on an intercom or scan a card at a reader to get through a gate? How many people stretch and jump to get their card close enough to a reader (because they are too lazy to take it out of their pocket) to allow them through an office door?

Access readers, be they card or some kind of tag, are hampered by requiring the device and the card to be very close to each other, from as much as 10 cm away to touching before they work. This may be an inconvenience, but it is also more secure and power friendly. The good news is that in certain scenarios, the option for longer range access technologies to verify someone’s access credentials is readily available.

The obvious location for these long-range readers is in environments where vehicles need fast, yet secure access through booms and gates. A tag in the cab can connect over a few metres to a reader and verify the vehicle, driver or both, allowing for streamlined entry and exit. For added security, these readers can be combined with licence plate readers.

ZKTeco’s Hendrik Combrinck says the market for long-range access control solutions has grown significantly in the last two years because of advances in the licence plate recognition and long-range wireless technologies. These solutions make it more convenient and faster to recognise a vehicle and give it access to a certain area.

Apart from licence plate recognition, Dan Drayton, Paxton’s country manager for South Africa, says RFID or UHF solutions are generally the technologies of choice. “RFID is more cost effective in the reader technology and UHF more cost effective in terms of tokens.”

While the market is growing in estates and business parks, among other areas, the long-range market is still one which can produce significant growth. Lawrence Mosadi from Geovision believes this may be due to the fact the few people know about the options. He says, “We are getting more requests about it from end users, but not installers.”

A few of the benefits Mosadi says long-range technology offers include:

• A more controlled parking environment with less human errors, e.g. guards sleeping at night and not opening the gate on time.

• Better traffic flow during office peak hours.

• Restricting vehicles from entering or accessing unauthorised areas.

• Vehicle counting and parking space sharing.

• Tracking suspicious activity.

• No more putting your hand out in the rain to tag. All is atomised by the RF antenna.

Drayton continues that the products in this market operate in a similar manner to normal proximity readers, communicating the token details over networks with a Wiegand protocol. This makes them quite simple to integrate into an existing or new system where the technology works with Wiegand readers.

Basically, is like using E-Tolls, says Mosadi. The tag will be on the left or right side of the vehicle’s windshield, depending on which side the RF antenna is mounted. The access control system will then ascertain which vehicle is approaching and check with a local or remote database to see if it is allowed to enter.

Most of the time, these technologies are just used to ensure the vehicle can access a certain area, however, Combrinck says that he has recently started seeing end users asking for dual verification for both the vehicle and the driver.

What’s on offer?

Despite the market still being somewhat limited, all three companies provide a range of solutions for long-range access. ZK’s long-range UHF readers were launched in South Africa at the beginning of this year and have proven a success. Combrinck says, “Our two models UHF2-5 and UHF2-10 can respectively read up to 6 and 12 metres. These models can also be used by any third-party controller that can receive a Wiegand input.”

Geovision’s long-range RFID solutions can operate at a distance of between 2 and 10 metres. Mosadi says they are ideal for parking lots, gated communities and employee parking.

Drayton says Paxton’s solutions centre on its Net2 product range, using RFID long-range readers and active tokens as it is the most cost effective and secure way of deploying the technology in the small to mid-market.

“Used in combination with our wired and wireless access control solutions, our clients can benefit from a flexible access control solution backed with our 5-year swap out warranty.”

For more information, contact:

• GeoVision SA: +27 (0)12 664 0411, sales@geovisionsa.co.za, www.geovisionsa.co.za

• Paxton, +27 (0)21 427 6691, support@paxtonaccess.co.za, www.paxtonaccess.co.za

• ZKTeco (SA), +27 (0)12 259 1047, sales@zkteco.co.za, www.zkteco.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...