Access control from an electrical engineer's perspective

March 2006 Access Control & Identity Management

Ken Gafner is a director at Rawlins Wales and Partners, a firm of consulting electrical engineers who undertake the full range of building services including safety and security systems, building automation, electrical reticulation and specialised building systems.

The Rawlins Wales engineers play an advisory role in the building process, for the purposes of this article Gafner focuses on the company's role in the security aspect of buildings.

"We start with the proverbial blank sheet and make sure the building is security-friendly," is how he describes it. The first step is to create a report on how we visualise the security principles will work in practice. More often than not clients want high security but they do not want it to be intrusive. Sometimes the clients have seen articles on security systems in place in buildings overseas and they want a similar implementation, but it must be appropriate for a specific project.

"During the days of isolation, South Africans had to develop their own solutions but now that we are, so to speak, part of the world again we can use and adapt the technologies and solutions used elsewhere. South Africans are very good at implementing leading-edge technology as soon as it has been proved to work effectively, we tend to keep a close watch on international trends and implement them accordingly. Our needs are not unique and having the world class equipment available locally helps in providing the optimum solution.

The basic principles of security have not changed much at all - the external perimeter is secured and provides early warning of intrusion, the building perimeter is typically the next level followed by high security areas, such as data centres contained within the perimeter. Each shell is nested and protected to a progressively higher level.

The key to effective protection is providing a consistent level of protection everywhere on each shell together with a balance of physical security, systems security and operating procedures.

Clients are made aware of any holes in potential 'shallow protection' areas, for example it is no use controlling the access through the reception area of a building if there is an unguarded entrance granting access through the car park. This is a typical example of not having balance or equivalent protection in every layer of the 'shell'.

Twenty years ago a card reader and pin code were adequate forms of access control. In the last five years the trend has been towards card readers coupled with some form of biometrics, fingerprint readers being the most common form.

Higher-technology access control started in places like the computer rooms of companies, where the people involved understood the need for the protection of assets. Now there is an increasing need to control the access of everyone entering a building and there is still a reticence from a few people. There have been huge developments in the technology involved in access control and this has been driven by the use of biometrics for purposes other than access control, for example driver's licences and immigration.

Gradually the general population is becoming more accepting of the use of fingerprints for purposes other than identifying criminals. Coupled with this are the massive advancements in computing abilities, which have added to the effectiveness of more acceptable and quicker forms of biometric access control. This has also driven the increased use of biometric time and attendance solutions linked to the access control systems in use within a company. Time delays in recognising fingerprints have reduced dramatically.

Video recognition technology where individuals are recognised as they pass through entrances has found applications in preventing known hooligans from entering football stadia overseas and has the potential for interesting applications in non-intrusive access control to buildings. It unfortunately still has a way to go and it is not really at a level where it is commercially available yet, but it has the potential to take over from conventional access control in the future.

The last 10 years have also seen enormous advances being made in the technology of CCTV cameras, particularly in the capability of the chips. The cameras have greater intelligence now, add this to the increased computing power available and you have vastly improved facial recognition ability, even remotely or 'on the move'.

The secret to successful access control in buildings is to treat everyone who enters the building in the same way. Behind the scenes more control can be obtained with the use of software programs that can be set to allow only certain people access to certain areas, but at face value it is important not to make any particular person entering a building feel any different to the rest.

Biometrics will be here for a very long time and it will gain more general acceptance as the positive aspects of it become more apparent to the general public."

For more information contact Ken Gafner, Rawlin Wales and Partners, 011 608 5000, keng@rwp.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...