The Technical Guide to Commercial Security Access Control
Are you considering commercial security access control for your business? Many companies will tell you all about the access control types and why you should buy them. However, small business owners may have some confusion about how these systems actually work.
It’s important to have a good understanding of the technical aspects of access control. It helps you pick the right option and stay safe from scams or false advertising. Local store runners may not know all about the technology, and tricky salesmen will use this against you.
So, we have created this simple, easy-to-understand guide for people like you. Keep reading to have a solid idea of how the different access control types work, and how exactly they can help your business.
Door Locks
Door locks are the most basic components of access control systems. However, these are different from your classic lever-and-key lock.
Access control locks are more secure than normal locks. They can also integrate with technology to make sure that only authorized people can unlock them.
There are two standard door lock types. They are as follows.
1. MagLock
Have you noticed that some metals act like magnets when you pass an electric current through them? This metal suddenly stops being a magnet when the power is switched off. You may have seen the big landfill cranes use this method to pick up metallic junk.
This phenomenon is known as electromagnetism.
- A MagLock uses the concept of electromagnetism to lock your doors.
- A MagLock has two parts – an electromagnet, and a piece of flat metal called an “armature plate.”
- One of these gets attached to your door, and the other will attach to your door frame.
- The electromagnet connects to your building’s main energy source.
- When the door is locked, current passes through the setup. It turns into a highly powerful magnet.
- This magnet attracts the metal plate so strongly that no one can pull them apart.
- When an authorized person tries to enter, the electromagnet deactivates for a short time. It locks up again when the person enters and shuts the door.
- A MagLock is fail-safe. This means that it will unlock all doors if your office buildings suddenly have a power cut.
- This keeps your employees safe and prevents them from being trapped inside during an emergency.
2. Electric Strike
Electric Strike follows a similar principle to MagLock but with a latch system. This latch system is actually more secure.
- The lock is set up with an electromagnet and a latch
- When the door is locked, the latch stays secure and prevents people from pulling it open.
- When authorized people try to access the door, the electromagnet system helps unlatch the lock.
- The people are now free to enter. It latches close again once they do.
- This type of lock is fail-secure.
- It means that it stays locked, even if the power is gone. This prevents thieves from stealing your precious data or Merchandise during a power cut.
- Electric Strike also has a few fail-safe options. It depends on your business need.
- You can also get a hold-open configuration. This means that once someone unlocks the door, it stays open until you close it again.
- It is simpler and saves time.
Readers
You’ve learned about the types of door locks and the way they only open for specific people. But how does the lock know which person is trying to open it?
This is where readers come into play. Readers are devices that scan a person’s identity and determine whether or not they’re allowed inside.
These devices come with specific identification methods. They may verify a person’s biometric information or read a specific card or chip that you gave to them.
Here are the main types of readers and how they work.
1. RFID
RFID stands for Radio Frequency Identification.
As the name suggests, it uses radio waves to know which person is near the lock.
Radio waves are a type of energy that people cannot see. However, we can create devices that transmit and detect this energy.
- RFID has three parts – a transceiver, a transcoder, and an antenna.
- The transceiver is meant to read radio signals, and the antenna helps it catch them.
- Together, the transceiver and antenna are attached to your door. This is the RFID reader.
- The transcoder is the part that actually sends the radio signal.
- It is attached to a tag and it carries the information of your specific employees.
- Small business workers can wear these transcoders as an ID card or just keep the tag with them at all times.
- When someone touches their tag to the reader, it uses electricity to transmit a signal containing this person’s information.
- The reader takes this information and decides whether or not the person is allowed to enter.
- Then, it sends the appropriate command to the door lock.
There are 2 types of RFID tags. It depends on the power source.
An active RFID tag has its own small battery. So, it is charged at all times. This battery helps it send the radio signal.
A passive RFID tag doesn’t have its own power source. So, how does it send the signal? Well, it starts working when you touch it to the reader. The reader sends its own electricity into the tag, allowing it to send the radio frequency.
2. Biometric – Fingerprint Scanner
It’s easy to understand what fingerprint scanners do. However, here’s a more detailed description of the devices and how they keep your building safe.
- First of all, there is a fingerprint-scanning device.
- This has a panel that is really sensitive to pressure.
- It detects the small bumps and ridges in a fingerprint and keeps a record of it.
- When you first install a fingerprint lock in your office, you will need to do a first scan of all the employees and staff members who frequent the building.
- The device makes a database from this entire first scan and connects each fingerprint to the access permissions of the specific person.
- The next time they try to enter, the scanner will determine whether or not they’re allowed inside the door.
- When you hire a new employee, you must take an initial scan of their fingerprint on their first day.
- Also, suppose you promote someone and give them access to a different area. You’ll need to update these permissions in the scanner.
Fingerprint scanners are common because they’re affordable and easy to use. Many small businesses also prefer them because a fingerprint is an integral part of a person. It’s not a card or tag that they might accidentally lose. So, it’s simpler to handle.
3. Biometric – Face ID
Face recognition systems use a camera to directly scan your employees’ faces when they are near the door.
It’s the easiest access control method because you don’t need to read a card or check a fingerprint. It saves time and helps your team focus on more important business matters.
Here’s a quick run-down of how it works.
- Like a fingerprint reader, you need to create the first database when installing a face scanner.
- The scanner takes pictures of all your employee’s faces, sometimes from different angles for better accuracy.
- It measures the distances between different facial features, like eyes, nose, and lips. Each person has a. unique set of distances.
- Then, it uses a machine learning algorithm and converts this image data into numerical data (based on the distances.)
- It saves this information, and your database is ready for use now.
- It grants your faculty the permission to enter a door or locks them out, based on whether or not they are allowed in.
Time Keeping
Time Keeping is an optional part of access control. However, it brings many benefits for the companies that choose it.
Time Keeping doesn’t require any additional devices beyond your access control installation. Ask Security in DFW and we’ll help you get it up and running.
This is the process of a timekeeping system.
- When you or your employees enter the building at the start of the day, it checks their identification. This was a part of regular access control. But it also begins a timer.
- This timer runs until the person leaves again at the end of the day. When they scan their ID a final time, it measures how long they were in the office and at what times.
- You can also set up your timekeeper to keep track of lunch or tea breaks. It counts the duration that your employees temporarily leave the office.
Security in DFW Can Help You Get the Best Access Control Systems
Now that you’ve learned all about access control, you’re ready to choose the best system for your business.
Why not get in touch with Security in DFW? We will help you get a free consultation. During this consultation, our experts analyze your access control needs. We are completely transparent, and we create a customized access system that works for your office.
HOURS OF OPERATION
Monday through Friday :
9:00 am to 6:00 pm
After hours and weekend
CORPORATE OFFICE
1509 W Hebron Parkway
Suite Number 150
Carrollton, TX 75010