Access control is the main part of the safety critical pyramid. So choosing a reliable solution is critical. The use of Kontrola dostępu technologies has grown tremendously in recent years. However, there are many solutions on the market that do not meet the minimum requirements for security, reliability, and stability that these systems require.
Access control is the main part of the safety critical pyramid. So choosing a reliable solution is key.
The use of access control technologies has grown tremendously in recent years. However, there are many solutions on the market that do not meet the minimum requirements for security, reliability, and stability that these systems require.
Within electronic security technology, access control is at the top of the pyramid regarding criticality, along with detection and fire alarm systems. For example: If we compare access control with CCTV or intrusion detection, if a camera or sensor was not working, even the average user of the system might notice this failure. However, if there is a malfunction in access control, they would immediately notice, because the user could not enter the protected site. And what’s worse, you will not be able to get out! And in the case of an emergency like the start of a fire, this can be critical.
Hence the importance of choosing a secure, reliable and stable access controls solution.
Electronic access control has emerged to solve some problems related to the use of keys, locks and mechanical locks. The use of the conventional metal key, as we know it today, has several negative factors.
The main ones are discussed below:
Keys can be copied: When carrying a key, you can go to any locksmith and request one or more copies;
There Is No History: It is not possible to know the date and time a carrier of a key enters or leaves a specific place, nor the number of times it did.
Key Loss: When this happens, it is necessary to exchange locks and locks for keeping the place safe.
There Are No Restriction Times: The key holder can enter the protected site on any given day and time, including weekends and holidays.
Key possession management: Who is each key with? This is an interesting and challenging question to answer if there is no effective control of the keys.
Multiple Keys: A separate key is required for each door. This leads to managers having to carry different keys.
Electronic access control resolves all of the above problems. Instead of a metal key, which can be copied easily, an electronic card is now used which may have different encryption mechanisms and protection against duplication, guaranteed by manufacturers. In addition, biometric readers can be used to prevent a user from using another person’s card.
With access control, you can easily restrict access days and times and issue detailed reports of user activity. A single card can open all doors since you obviously have the access permissions to do so.
Nowadays, with the increasing adoption of outsourced security equipment, access control has had a very important role for companies. As the rotation of this security personnel is high, security personnel are not able to recognize all personnel and know whether or not a person belongs to that particular place. With the use of an electronic access control system, each user must use their card, password or biometric to enter the protected space. Therefore, the authorization criterion is impersonal; it is performed automatically by the Kontrola dostępu system.
Kontrola Dostępu Technology
The first variable that will be set when choosing an access control system is the technology of the reader and card. At present, there are several technologies such as bar code, magnetic, Proximity of 125 Khz, Smart Card (contact and non-contact) and biometric readers. Many of these technologies are already obsolete, and those that are still in force are Smart Card with own key encryption and biometric readers.
As for the topology, the Kontrola dostępu systems can be classified as Autonomous “Stand Alone” Based on the server “Server based” or hybrid with Distributed Intelligence. Below is a brief description of the operation of each:
Autonomous Systems “Stand Alone”: These are systems that have their own intelligence and do not require software to operate. The entire user database and permissions are stored in its internal memory. Usually, these are systems with limited capacity and do not allow remote administration. They can be audited or not.
Online Systems: In this topology, all intelligence is on the server which is responsible for the release of access. When an access request comes through a reader (proximity, magnetic, bars, biometrics, etc.), it is sent to a server, which will review the authorization grant level, giving or not access and returning the command of release.
Systems: In this topology, all intellect is found in the controller that is responsible for the access release. Upon release, the event is sent to the software on the server for monitoring and reporting. In the case of loss of communication with the server, the access is released, and the event is stored. The following is a diagram showing the topology of an Kontrola dostępu system with distributed intelligence:
Access Control System With Distributed Intelligence
Distributed intelligence access control systems are the most recommended, as they guarantee operation even in the event of a communication network failure or server failure.
In summary, here are some technical recommendations for choosing a reliable and secure access control solution:
The Access Control System Must:
- Have its operation based on the topology: Distributed intelligence;
- Allow integration with other systems such as CCTV, intruder alarm, fire detection, and alarm, automation, etc.
- Use smart card technology with encryption for readers/cards and biometric readers in the most restricted areas;
- In addition, it is essential to choose an integrative company certified in the solution and with experience in access control.
- Opt for an open access control solution that is not marketed exclusively by a single company. With this, the end user will be free to change the installer, in case he is not rendering a good.