Comprehensive access control solutions feature at Secutech 2015

Comprehensive access control solutions feature at Secutech 2015

Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and characteristics of each type of access control are explained here in this article.

Password-based access control: This is a system that requires a password to open doors. The electronic lock will open once the password is deemed correct. The advantage is that the system requires no keys or cards; only the password needs to be entered. But there are some disadvantages, too. One of them is that the key-in and reading of passwords may take some time. This may result in a long queue as workers enter a building to get to work. Another disadvantage is a low level of security: passwords can be guessed by people's gestures or stains that they leave on the keypad. Passwords are also easily forgotten or revealed. That's why access control systems based on passwords have become less and less popular.

Card-based access control systems can be further divided into two subcategories: those using contact cards and those using contactless cards. Contact cards, which can be broken or worn out, have become less common and are seen only at banks or unmanned ATM vestibules. Contactless cards, meanwhile, are durable, cost-effective, fast, and more secure. These features have made contactless cards the mainstream access control technology at present time. Contactless cards, indeed, are seen as the embodiment of access control.

The last category is biometrics, which identifies people based on their particular physical attributes. Common biometrics technologies include fingerprints, finger veins, iris scans, and facial recognition. A key advantage is that cards are not required for opening doors. In addition, overlapping or duplication of physical attributes is extremely unlikely, making the system secure. A disadvantage is that biometrics solutions are expensive. Meanwhile, physical attributes may change according to variations in the environment. For example, disparities in humidity may cause minor changes to fingerprints, while finger veins and the face may change along with age. The iris may change slightly due to eye diseases. These changes may increase the system's false acceptance rate and false recognition rate. Yet, the accuracy of biometrics systems has improved continuously, and cost has gone down by the year. This has led to increased deployment.

In addition, in recent years we are seeing more diverse applications in different vertical markets. These include NFC- and RFID-based access control and solutions that combine access control and mobile equipment. All these products and solutions will feature at the Access Control Pavilion – Asia's most comprehensive access control exhibition – at secutech 2015, held from April 28 to 30. To find out which access control companies will take part in the show, please go to www.secutech.com.

Sponsored by:  
Secutech, the annual international exhibition and conference for world-class manufacturers and discerning buyers of security products and solutions, will take place from 28 – 30 April 2015 at the Taipei Nangang Exhibition Center in Taiwan.
Now in its 18th year, secutech features some 500 exhibitors from 20 countries and attracts over 26,000 visitors. Dedicated pavilions for the following sectors: Surveillance | Software & Management Systems | Transmission & Networks | Smart Homes | Key Components / Parts | Electronic Systems

Register your FREE visitor badge now at www.secutech.com/registration/en

Share to:
Comments ( 0 )
Most Viewed Articles