Access Control is the ability to manage and control entrance access traffic to a specific area. The access control systems can use various types of access credentials that can be assigned to each individual user. In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. Locks and login credentials are two analogous mechanisms of access control.
Some Key Features Galaxy Media can bring to your business through Access Control:
Access rights can be assigned and configured to each user individual’s needs along with individual details such as name, card/credential number, personal data, photo, fingerprints, and many other customer features. Access Control can also automate unlocking and locking on door(s) to a desired schedule and time. Schedules can be configured for years in advance and also can program holiday. Visitor Management: Manage and control access for temporary users and/or visitors by assigning visitor level access. Badge Designer: Design and develop customer badges on a separate badge or right on the card credential. Database Management: PC based Access Control Systems provide feature rich reporting capabilities such as comprehensive listings of alarms, users interactions, access rights and set up information. Anti Passback Access Control: Prevents individuals from passing credentials to a second person to gain entry or exit. Hardware Integrations: Provides the ability to control and monitor virtually any type of device(s) including fire sensors, intrusion sensors, external lighting, parking barriers/gates, heating and air systems, and CCTV systems.
Proximity cards have a pre-programmed computer chip inside them. These chips come with an identification number burned into them. Every card is unique. The proximity reader reads this id number, sends it to the access control software and the software determines whether or not this card is authorized for the action it is requesting.
One of the most common biometrics used today is fingerprint information. A biometric can be used to protect secret data, such as a password, providing both security and convenience. The biometric information is captured during enrollment and translated into a template, which is stored for subsequent authentication. The template can be stored on a portable device such as a smart card in a database on a server, or any other appropriate environment. During authentication, the biometric information is captured and compared against the stored template. If the user is valid, the two images will match, and authentication is achieved.
Smart Cards have computer chips in them that are programmable by the authorized user. It’s just a tiny computer. In addition to an access identification number like the proximity card, you can program debit accounts, library cards, user information, etc. The ideal applications are facilities that require multiple pieces of information programmed on cards, especially if that information changes regularly.