Door access control systems are a set of devices that prevent free access to some protected regions using a mechanical device such as barriers, turnstiles, or doors controlled by electric locks.
The door access control systems must identify the user and verify whether he/she has permission to access the protected area, activating the mechanism that enables access in case of valid identification. Electronic access controls are straightforward to install and use. There will be no problems in their use, and they do not require any training for their use in the case of control intended for a large number of people.
There are different means of door access control systems identification, each with specific characteristics. It is essential to select the most suitable identification method for each need. The most common identification methods are
Identification is made using a numerical code of between 4 and 6 digits. The code can be different for each user, although several users may have the same principle. It is an economic identification system since it does not require identifiers. Each user can change the code at any time.
Identification using a card or key fob with a unique number transmitted by radio frequency to the reader when it is approached. The cards do not require maintenance (battery change) and have a low cost, are managed in the system itself, and can be canceled in case of theft or loss.
The identifier is a radio frequency remote control that transmits the identification code at the push of a button. They have a range of several tens of meters. RF remotes cost more than proximity cards and require batteries to operate. These identifiers are particularly suitable for vehicular access.
Allows the use of cell phones as identification devices. They can operate automatically so that the door opens automatically when approaching the access if the cell phone is registered in the system. Door access control systems can also be configured to require the pressing of a key or entering a numeric code with the cell phone keypad.
Identification is made through the user’s fingerprint. It offers a very high-security level as it is a unique and unrepeatable characteristic of each person. Biometric fingerprint identifiers record many characteristic points of each fingerprint, but not the fingerprint itself. With the information stored, it is impossible to reproduce a complete fingerprint of the user to use it for another purpose.
The main advantage of this type of identification and the fact that the identifier itself has no cost is that it unequivocally identifies the user since it is impossible to lend the identifier to another person, as can happen with other identifiers.
A small percentage of users whose fingerprints do not have sufficient information to be used as an identifier should be borne in mind. In these cases, alternative identification systems must be provided for these users.
In accesses where the security level is to be increased, it is possible to use double identification by combining different identifiers for the same access, thus forcing the user to identify with two other identifiers. The most common combined identification systems are fingerprint, proximity, fingerprint, keypad, and proximity plus keypad.