The primary function of an ‘automated’ Access Control System is as the name implies – to allow quick and unimpeded access to authorised persons to enter to an area, or section thereof, pertaining to say, a property or building, without operator intervention. Likewise however, it is also to curtail unauthorised physical access to said areas.
This is usually accomplished through the use of locks and gates that are electronically released via hardware interfaces (and software depending on the system), programmed to recognise a unique authorised RF tag carried by each authorised individual, or by recognition of an authorised biometric profile pertaining to that individual. Most systems will allow configuration of where specifically (and where not) individuals are allowed access, as well as according to what at times.
There are a variety of hardware systems (each supported by their respective user interface software) that accomplish this. Generally most consist of controllers and/or readers that interrogate and control the respective access points and locks, and communicate via a network and interface to a Server/PC. In this manner an accomplished Access Control System will also provide an Event Log of when and where persons were granted (or denied) access which is useful for investigative purposes.
Simpler ‘manual’ forms of access control include deployment of audio and video intercoms (including large systems that cater for apartment blocks) where tenants control access to the premises upon having identified a caller.
The brands that we typically support in the sphere of access control include: