Electronic access control systems are control systems that integrate a range of electronic devices and locks that control access to a particular area. Electronic access control enables security to know what time a person entered and left a premise, the duration that that person stayed in that premises and all the activities person did in that premise. Electronic access controls are inexpensive to manage, difficult to duplicate, invalidate and validate a user in a short period of time, easy to conduct an audit trail, easy to adapt to changes in security needs, and can be used easily by temporary users (International Foundation for Protection Officers, 2010). 2.0.
Components of an Electronic Access Control System The Access control system helps in management, monitoring and controlling human access to a protected facility or equipment. Most Access control systems usually operate by taking an individual’s credential as the input, analysing or verifying the credential, and then granting and denying the individual access based on verification of the credentials. The access control system is able to verify access through various components liked together to form an electronic access control system.
The first component of access control system is credentials (Jackson & National Institute of Justice (U.S.), 2015). A credential is a tangible or physical object that enables an individual to gain access in a restricted or controlled area. Credentials include things that an individual knows such as numbers or personal Identification Number (PIN), things that an individual has such as access tokens, things that an individual has such as biometric features (ICT-EURASIA Conference, 2013). The main applications in a credential include codes and tokens.
Codes are things that an individual knows. Codes are either common or personal. Codes can be known to a common group or common to an organization. Personal Identification Numbers are normally personal and highly confidential. Codes are usually numerical and 4 to 5 characters long. When using codes caution must be taken to avoid duplication of codes. Codes provide high tech security solution when used to verify persons when used with other credentials. A Token or a card is something that an individual has.
A token is a credential that contains a unique readable identifier such as tags, keys, and cards. Tokens are readable either by contact where the token must touch the reader or by distance or proximity, where the token does not touch the reader. Tokens are large in number and vary with price and characteristics. A token is also known as a card. According to ICT-EURASIA Conference (2013) there are five types of tokens or cards. The first token is radio frequency identification token. This is a smart card that is issued to an individual.
It is a contactless card. Radio frequency identification act as both a passive tag and a proximity card. The second type of a token is active proximity token. These are cards that give a longer range .Active proximity cards use batteries. The reading range for active proximity cards is from 1 metre to 10 metres. The third type of token is a passive proximity token. Passive proximity cards are characterized small chips placed inside the cards. Passive proximity cards have a shorter range than active proximity cards.
The chips can only transmit for short distance of less than 15 centimetres. The fourth type of a token is a Contact token. Contact cards or tags have contacts on the surface. They are hard to copy but wear off over a short period of time. Contact cards or tags include PIN and chip bank cards. The fifth type of a token is a Swipe token. These are cards that use magnetic strips to store data used to identify an individual. The information stored in the card is read by inserting or swiping the card over a reader.
Swipe cards are cheap and deteriorate quickly over time. Swipe cards can be duplicated easy and therefore, they need replacement from time to time.
Read More