Access control - market sectors

Access & Identity Management Handbook 2004 Access Control & Identity Management

Audio and video-entry systems

Audio and video-entry systems are widely used in the household sector and in smaller non-domestic locations. An electronic strike lock is operated remotely by the person identifying the caller. A video element can be used to combine verbal interrogation with visual recognition. Being non-automatic, these systems are not suited to locations where there is a high throughput of people, or where 24-hour access is needed and cannot be monitored.

Biometric systems

Biometric systems identify individuals by means of personal characteristics, often fingerprints or hand geometry. Other characteristics that can be used include voice pattern, iris pattern, dynamic signature recognition, retinal pattern, vein pattern and face recognition. Biometric systems are highly accurate and are able to cope with day-to-day variations caused by minor injuries or colds, etc. When a biometric system is installed, the sensitivity of the system must be set to avoid erroneous lockouts while maintaining security.

Biometric systems have the advantage that there are no cards or tokens to be mislaid. They are difficult to cheat because you cannot borrow, copy or steal another person's physical characteristics. These systems are most effective where there is a known group of personnel whose statistics can be read into a database for later comparison. Biometric systems are not useful for granting access to visitors who are not already on the database.

A biometric system is usually the most expensive option, but prices have fallen considerably in the last few years.

The systems can be demanding in terms of data storage. One solution is to record the biometric template for each user on a smartcard. When the user wants to open a door, he has to allow the system to take the biometric measurement (scan the finger, for example) and then he presents the smartcard for comparison. Thus, he proves he is the legitimate holder of the card. There are various security measures that can be used to ensure that only cards generated legitimately by the system can be used. Smartcards can double for other smartcard functions. The reduction in smartcard cost makes this a feasible option, although it does negate the advantage of biometric systems, which have no cards to be carried and possibly lost.

Card systems

Card systems involve entering a card in a card reader. Adding the photograph and details of the authorised card bearer enables any access-control card to double as an identification card.

Several different card technologies can be used for access control. The main ones are as follows:

Bar code

This is a very inexpensive option but duplication is possible and the amount of information that can be stored is low. Bar codes are useful for low-security applications and short-term applications, such as entry to exhibitions. Infrared bar codes and readers can also be produced, using codes that are not visible to the eye. These have the advantage of being more difficult to reproduce.

Barium ferrite

This is the oldest card-system technology. A sheet of barium ferrite is encoded during manufacture and embedded in the card. Cards cannot be copied but are thicker and heavier than other types. They cannot be kept in a wallet with magnetic stripe cards because they can corrupt them. Barium ferrite tends to be superseded by the Wiegand and magnetic stripe technologies.

Dual function

As an organisation expands, it may adopt more than one access-control system. It may want to be prepared for smartcard functions in the future. One solution can be to use two technologies on the same card. A combination of the Wiegand and magnetic stripe technologies is sometimes used for sites that have both high-security and low-security areas. A smartcard that includes a magnetic stripe is also a possibility.

Magnetic stripe

Magnetic stripe cards are cheap to produce and widely used for low- to medium-security applications. They are not prone to accidental erasing, but the cards do deteriorate with wear. They also have a fairly limited data-storage capacity.

Smartcards

Smartcards include a microprocessor, which stores information about the holder. Smartcards offer high security and the same card can serve many other functions, as well as access control. The two main categories of smartcard are contact and contactless.

Wiegand cards

Specially-constructed Wiegand wires embedded in a card induce a current in the coils of the reader. This technology is highly secure, being almost impossible to duplicate. Wiegand cards are very durable and not affected by external magnetic fields.

Digital keypad systems

Digital keypad systems comprise a user terminal with a series of numbered pushbuttons or a touch-sensitive pad, linked to the lock release mechanism via a control unit. The control unit is pre-set with a personal identification number (PIN), which unlocks the entrance when the same number is keyed into the terminal. The PIN can usually be changed at any time.

Keypads are widely used in flats, schools, offices and leisure centres. They can be used in conjunction with card readers in more complex access control systems. To avoid the risk of watchers learning the sequence of numbers, there are randomised scrambler keypads, on which the digits appear in different positions each time the pad is used.

Proximity, long-range and hands-free systems

The proximity reader picks up radio frequency (RF) emission from a card, key or token, which has to be placed touching or, in some systems, near to the reader. There is less risk of wear than with other systems. Proximity and hands-free systems are more accessible to people who have some manual disability because there is no card that has to be inserted into a reader. Systems also allow a much faster throughput of people, so they are useful for busy locations. This type of system is sometimes called passive proximity because the card does not need to be equipped with a battery.

Hands-free systems use a reader that can accept an RF token at a distance. The token may, for example, take the form of an identification card, worn as a pendant or on clothing. These systems are useful when staff need to pass in and out frequently, especially if they are carrying equipment. The reading range can be up to 10 metres depending on the application. This technology is similar to proximity systems but the cards or tokens need to be equipped with an internal battery. This type of RF access control is sometimes termed 'active proximity'. Vehicle access-control systems involve the use of a barrier, such as a lever bar or gate. Some are RF vehicle tags for long-range reading, while others require the driver to insert a card in a reader.

Token-based systems

These are designed to allow entry when a pre-programmed card is inserted or swiped through a slot in the terminal, or when a pre-programmed token is placed in close proximity to the terminal. These so-called proximity readers combine considerable reliability and durability with ease of use.

Online systems

Online systems generally provide realtime management facilities, including the ability to add, delete or amend levels of authority, with graphic and text displays for ease of operation. A range of reports can be generated to provide details of current or historical events, enabling access control systems to fulfil additional needs, determining occupancy if it becomes necessary to evacuate a building in an emergency, or discovering who went where, when and for how long for investigation purposes.

Conclusion

The terrorist attacks on the US on 11 September 2001 has given a boost demand for security products and services generally, and has tended to give security installations a higher priority when budgets come up for approval. Whether the access-control market in SA has yet received much of a boost from the fears of terrorism is doubtful. Also, much of the customer base for access control is unlikely to feel threatened by terrorism. However, this influence is likely to help to boost demand from the high-security end of the market in the future.

Biometric systems are now becoming well established in SA and although high security sites account for most demand it is expected that the customer base will spread to medium-security applications as the prices continue to fall. However, contactless smartcards are seen as the next high growth sector and will eventually erode sales of proximity systems. Contactless smartcards offer all the advantages of proximity and can be used for additional functions. Hands-free systems tend to be used for specialised locations, where fast throughput is important. They require long-range readers, which means that the sector is not threatened by contactless smartcards and demand will remain strong.

Brian Barnes
Brian Barnes

Brian Barnes is a security technology specialist, he can be contacted at Hodari Security Technologies, 082 973 8295.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...