Access control - market sectors

Access & Identity Management Handbook 2004 Access Control & Identity Management

Audio and video-entry systems

Audio and video-entry systems are widely used in the household sector and in smaller non-domestic locations. An electronic strike lock is operated remotely by the person identifying the caller. A video element can be used to combine verbal interrogation with visual recognition. Being non-automatic, these systems are not suited to locations where there is a high throughput of people, or where 24-hour access is needed and cannot be monitored.

Biometric systems

Biometric systems identify individuals by means of personal characteristics, often fingerprints or hand geometry. Other characteristics that can be used include voice pattern, iris pattern, dynamic signature recognition, retinal pattern, vein pattern and face recognition. Biometric systems are highly accurate and are able to cope with day-to-day variations caused by minor injuries or colds, etc. When a biometric system is installed, the sensitivity of the system must be set to avoid erroneous lockouts while maintaining security.

Biometric systems have the advantage that there are no cards or tokens to be mislaid. They are difficult to cheat because you cannot borrow, copy or steal another person's physical characteristics. These systems are most effective where there is a known group of personnel whose statistics can be read into a database for later comparison. Biometric systems are not useful for granting access to visitors who are not already on the database.

A biometric system is usually the most expensive option, but prices have fallen considerably in the last few years.

The systems can be demanding in terms of data storage. One solution is to record the biometric template for each user on a smartcard. When the user wants to open a door, he has to allow the system to take the biometric measurement (scan the finger, for example) and then he presents the smartcard for comparison. Thus, he proves he is the legitimate holder of the card. There are various security measures that can be used to ensure that only cards generated legitimately by the system can be used. Smartcards can double for other smartcard functions. The reduction in smartcard cost makes this a feasible option, although it does negate the advantage of biometric systems, which have no cards to be carried and possibly lost.

Card systems

Card systems involve entering a card in a card reader. Adding the photograph and details of the authorised card bearer enables any access-control card to double as an identification card.

Several different card technologies can be used for access control. The main ones are as follows:

Bar code

This is a very inexpensive option but duplication is possible and the amount of information that can be stored is low. Bar codes are useful for low-security applications and short-term applications, such as entry to exhibitions. Infrared bar codes and readers can also be produced, using codes that are not visible to the eye. These have the advantage of being more difficult to reproduce.

Barium ferrite

This is the oldest card-system technology. A sheet of barium ferrite is encoded during manufacture and embedded in the card. Cards cannot be copied but are thicker and heavier than other types. They cannot be kept in a wallet with magnetic stripe cards because they can corrupt them. Barium ferrite tends to be superseded by the Wiegand and magnetic stripe technologies.

Dual function

As an organisation expands, it may adopt more than one access-control system. It may want to be prepared for smartcard functions in the future. One solution can be to use two technologies on the same card. A combination of the Wiegand and magnetic stripe technologies is sometimes used for sites that have both high-security and low-security areas. A smartcard that includes a magnetic stripe is also a possibility.

Magnetic stripe

Magnetic stripe cards are cheap to produce and widely used for low- to medium-security applications. They are not prone to accidental erasing, but the cards do deteriorate with wear. They also have a fairly limited data-storage capacity.


Smartcards include a microprocessor, which stores information about the holder. Smartcards offer high security and the same card can serve many other functions, as well as access control. The two main categories of smartcard are contact and contactless.

Wiegand cards

Specially-constructed Wiegand wires embedded in a card induce a current in the coils of the reader. This technology is highly secure, being almost impossible to duplicate. Wiegand cards are very durable and not affected by external magnetic fields.

Digital keypad systems

Digital keypad systems comprise a user terminal with a series of numbered pushbuttons or a touch-sensitive pad, linked to the lock release mechanism via a control unit. The control unit is pre-set with a personal identification number (PIN), which unlocks the entrance when the same number is keyed into the terminal. The PIN can usually be changed at any time.

Keypads are widely used in flats, schools, offices and leisure centres. They can be used in conjunction with card readers in more complex access control systems. To avoid the risk of watchers learning the sequence of numbers, there are randomised scrambler keypads, on which the digits appear in different positions each time the pad is used.

Proximity, long-range and hands-free systems

The proximity reader picks up radio frequency (RF) emission from a card, key or token, which has to be placed touching or, in some systems, near to the reader. There is less risk of wear than with other systems. Proximity and hands-free systems are more accessible to people who have some manual disability because there is no card that has to be inserted into a reader. Systems also allow a much faster throughput of people, so they are useful for busy locations. This type of system is sometimes called passive proximity because the card does not need to be equipped with a battery.

Hands-free systems use a reader that can accept an RF token at a distance. The token may, for example, take the form of an identification card, worn as a pendant or on clothing. These systems are useful when staff need to pass in and out frequently, especially if they are carrying equipment. The reading range can be up to 10 metres depending on the application. This technology is similar to proximity systems but the cards or tokens need to be equipped with an internal battery. This type of RF access control is sometimes termed 'active proximity'. Vehicle access-control systems involve the use of a barrier, such as a lever bar or gate. Some are RF vehicle tags for long-range reading, while others require the driver to insert a card in a reader.

Token-based systems

These are designed to allow entry when a pre-programmed card is inserted or swiped through a slot in the terminal, or when a pre-programmed token is placed in close proximity to the terminal. These so-called proximity readers combine considerable reliability and durability with ease of use.

Online systems

Online systems generally provide realtime management facilities, including the ability to add, delete or amend levels of authority, with graphic and text displays for ease of operation. A range of reports can be generated to provide details of current or historical events, enabling access control systems to fulfil additional needs, determining occupancy if it becomes necessary to evacuate a building in an emergency, or discovering who went where, when and for how long for investigation purposes.


The terrorist attacks on the US on 11 September 2001 has given a boost demand for security products and services generally, and has tended to give security installations a higher priority when budgets come up for approval. Whether the access-control market in SA has yet received much of a boost from the fears of terrorism is doubtful. Also, much of the customer base for access control is unlikely to feel threatened by terrorism. However, this influence is likely to help to boost demand from the high-security end of the market in the future.

Biometric systems are now becoming well established in SA and although high security sites account for most demand it is expected that the customer base will spread to medium-security applications as the prices continue to fall. However, contactless smartcards are seen as the next high growth sector and will eventually erode sales of proximity systems. Contactless smartcards offer all the advantages of proximity and can be used for additional functions. Hands-free systems tend to be used for specialised locations, where fast throughput is important. They require long-range readers, which means that the sector is not threatened by contactless smartcards and demand will remain strong.

Brian Barnes
Brian Barnes

Brian Barnes is a security technology specialist, he can be contacted at Hodari Security Technologies, 082 973 8295.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Smart parking management platform
Access Control & Identity Management Asset Management, EAS, RFID
Parket builds a seamless bridge between supply and the ever-increasing, but fluid – and often temporary – demand for parking bays.

Visible-light facial recognition terminal
ZKTeco Access Control & Identity Management Products
The SpeedFace-V5L [P] is a visible-light facial recognition terminal using intelligently engineered facial recognition algorithms and the latest computer vision technology.

Facial and palm verification
ZKTeco Access Control & Identity Management Products
The ProFace X [P] supports both facial and palm verification, with a large capacity and rapid recognition.

Glide Master High Security 90° Sliding Gate
BoomGate Systems Access Control & Identity Management Products
Boomgate Systems was asked to make a sliding gate that can turn 90 degrees. The gate had to offer high security and be vandal-proof.

Informing, entertaining and communicating across your landscape
Evolving Management Solutions Access Control & Identity Management
For the first time, the attraction of large shopping malls with many stores, entertainment and food courts no longer offers enough appeal to attract customers.

Suprema’s new BioStation 3
Suprema Access Control & Identity Management Products
The brand new BioStation 3 is not only Suprema’s smallest face recognition device to date, but it also comes packed with the largest variety of features.

Suprema renews international privacy and security standard certifications
Suprema News Access Control & Identity Management
Suprema has simultaneously renewed two important international standard certifications regarding information security management (ISO/IEC 27001) and privacy information management (ISO/IEC 27701).

SuperVision biometric access control
Integrated Solutions Access Control & Identity Management Products
SuperVision is a time & attendance (T&A) biometric access control system Fourier IT has been developing and enhancing for 18 years.

Manage energy usage with Paxton access control
Paxton Access Control & Identity Management Products
Paxton provides access control systems that can integrate with existing infrastructure and manage a building’s energy-consuming activities to save energy and costs.

Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter
Access Control & Identity Management Cyber Security
Malicious cyber actors are experimenting with new attack vectors and increasing the frequency of zero-day and other attacks, according to Fortinet’s 1H 2022 FortiGuard Labs Threat Landscape report.