In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.The act of accessing may mean consuming, entering, or using. Permission to access a resource
When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database.
There are three types (factors) of authenticating information:
-something the user knows, e.g. a password, pass-phrase or PIN
-something the user has, such as smart card or a key fob
-something the user is, such as fingerprint, verified by biometric measurement
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password, in combination with the extant factor of the user in question, and thus provide two factors for the user with the missing credential, giving three factors overall to allow access.
Basic (non-intelligent) readers: simply read card number or PIN, and forward it to a control panel. In case of biometric identification, such readers output the ID number of a user. Typically, Wiegand protocol is used for transmitting data to the control panel
-RFID sensor and cards,
-Integrated software systems accordingly
Ready to start your next project with us? That's great! Give us a call or send us an email and we will get back to you as soon as possible!