Access control - past, present and future

Access & Identity Management Handbook 2004 News & Events

Access control, in one form or another, is as old as mankind itself. When primitive man rolled up a stone to the entrance of his cave to protect himself from wild animals, he was in effect, controlling the movements of animal traffic through a point of entry or portal.

By the seventh century BC, access control had evolved to the point where crude locks and keys were used by the Persian King, Sergon II, on the gates of his palace. Modern key-activated locks, such as those used with safes or to control access to private premises, are merely sophisticated versions of the earlier crude lock and key.

For many years locks and keys were adequate in controlling the entry and exit doors of buildings. As security became more important it became obvious that a better system was needed. Locks could be picked and keys copied. If a security area key was lost, stolen or misplaced, it was necessary to replace all the locks using that particular key, in order to maintain maximum security. Another disadvantage with locks and keys, is that there is practically no way of determining who went where and when. Access control systems evolved from this need to know who went where and when. Three basic types of access control systems can be identified, these are manual, machine-aided manual and automated.

Manual systems

Manual systems use people, usually dedicated security guards, to control access to restricted areas based on a simple visual check of the person wishing to enter and/or the exchange of one identification card for another. This last procedure forces the guard to make a positive identification before the exchange of cards takes place. The main disadvantage with this type of access control system is that entry or exit depends to a large extent on the integrity of the guard.

Machine-aided manual

Machine-aided manual systems refer to those systems in which the guard is provided with entry-control equipment to assist him/her in his/her duties. The guard may, for example, be required to undertake intermittent personnel and package searches for contraband, such as firearms, before allowing access. The type of entry-control equipment used by the guard, to assist him/her in making decisions to allow or deny access, includes items such as X-ray machines, metal detectors and explosive detectors. Airport check-in security is a good example of this method. Although security is enhanced by employing entry-control equipment, the guards are still required to control access to the restricted area and therefore, machine-aided systems suffer from the same disadvantages as the ordinary manual system - that is, guards are still required to make the decision regarding entry or exit to or from the restricted area.

Automated systems

In contrast to manual types of access control systems, which rely on a person (usually in the form of a security guard) to make the decision to allow entry or exit to or from the restricted area, automated systems allow people to enter or exit without 'guard' intervention. However, should an alarm be triggered by an attempted intrusion through the access point, or in some cases by an incorrect attempt to enter or exit the restricted area (such as entering at the wrong time) guard response is necessary. This means that guards are not required to control access on a permanent basis but only need to be available when an alarm is triggered. Thus, a saving in the number of guards required is achieved, as fewer guards can be located at a centralised point, ready to respond to alarms received from the different security (restricted) areas. Possibly the best known automated systems are the card access control types. These vary from the simple 'standalone' systems to the more sophisticated computer-based systems. Standalone systems control access at the entry or exit point, either at the card reader itself or via a small control unit located in close proximity to the few card readers it controls. On the other hand, computer-based systems control many card readers from a central processing point. The larger open architecture type of access control systems can control movement on a worldwide basis and also provide the platform to integrate other security systems, such as, alarm monitoring, intrusion detection, and closed circuit television systems to form a totally integrated security management system.

What next?

Although entry control systems have been around from the times of primitive man, the basic functions remain the same. That of controlling the movement of people and goods through some form of portal. Having looked at the past and present, what of the future? The access control industry forecasts strong growth for smartcard and biometric systems - although opinions vary as to how soon or how fast these sectors will develop.

The smartcard sector is expected to be the first to boom. Contactless smartcards are thought to offer the best prospects, since they can compete with the currently popular proximity systems. Some suppliers are confident that proximity technology will remain dominant for rather longer and think that South African customers will be slow to take up the added features of smartcards.

Potential customers are already becoming more accustomed to the idea of biometric systems and these are gaining sales in South Africa. Sales progress in this sector is likely to be more gradual than in the smartcard sector, but at some stage biometrics could become the dominant technology. Prices for biometric readers and smartcards and readers are expected to continue to fall. It is too soon to predict which, if any, of the biometric technologies will eventually dominate the market. Iris recognition appears to be gaining sales for high-security applications, while systems based on fingerprint pattern or hand geometry tend to be less expensive and are perhaps more easily accepted by the users. There are several other technologies with possibilities.

Continued growth is expected for integrated-security systems and for systems integrating wider building-control functions with security. There will be growth in intelligent networked systems and the use of asset tagging linked to access-control systems.

Threats to security will be the driving force in the growth of the access control industry. For example, the terrorist threat places the emphasis on customer sectors, such as airports, government establishments, high-profile companies and large office blocks, but these are already important customers. Other kinds of threat, such as computer fraud and industrial espionage, remain more probable for many of the customers of the access-control industry. However, a climate has been created in which security is likely to receive high priority generally.

Brian Barnes
Brian Barnes

Brian Barnes is a security technology specialist, he can be contacted at Hodari Security Technologies, 082 973 8295.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.