Posts Tagged ‘ access control systems ’

Designing Access Control

Written By:
Friday, July 18th, 2014

Determining the necessary equipment for building access can be confusing and one must decide if Access Control is the correct way to go.  I will point out what benefits an access control system will give you.

  • Access Control will simplify the way you gain entry or access your Building.
  • No more handing out keys that later Employees or contractors might lose.
  • Credentials can be given that are either permanent or temporary. Any guests, contractors or Employees can utilize these.
  • Typically if a key is stolen or lost there comes the daunting task of re-keying the whole facility to conserve security. The cost for lock cores can be between $30 and $75 or greater and a locksmith will charge for labor about $50 an hour or more. This can get really expensive with a location with multiple doors, especially if the key that was stolen or lost gives access to many doors.
  • Audit Trail: Using normal keys will not keep a log of who has gained entry to the building or location. A surveillance system will help but the daunting task of going over footage to find who gained entry is time consuming.
  • With the use of Keys in many facilities you are required to lock each door and unlock at every start and end of a business day.

What areas should I Secure?

After deciding as to why you want an Access Control System, you will ask yourself as to what assets to secure. You want to cover doors that will be used frequently. Doors that are not used frequently do not require hardware for access control unless there is are high value assets. These doors include areas such as a closet, non-critical offices, and mechanical spaces just to name a few.

Areas that Access Control is typically applied to are:

Exterior Doors:


Typically exterior doors are the first to be secured. This greatly simplifies the access to your building and this also means that your staff does not require any keys, while also keeping unauthorized persons outside of all entrances except those who you specifically allow entry. Any type of Visitor will be directed to a certain area. Typically this is handled in different ways. The first is a remote scenario where the Visitors find themselves in front of an intercom in some occasions as well as in front of a camera where they can speak to a Manager or Security Staff who will then release the door and allow them entry into the facility.

In a scenario where the guests are greeted by staff usually the front door is left open or there is someone to open the door like a Door Person and then speak with someone at the Front Desk. Usually this person will give the guest a temporary ID that will double as a key to gain entry to key points of the facility.



In most cases Gates are added to access control systems. This will create a perimeter from the front door. This is great for High security locations or in areas where there is higher crime rates. It is also paired with Surveillance equipment that will allow Security to view all areas of the Property as well as any entry points at the gates.

HR and Accounting Areas:


These areas are key locations that will have sensitive information that need to be secured at all times.

Data Closets / Server Rooms:

network server room

There is an increase need for network security, access control data centers and IDF’s [Intermediate Distribution Frame]. Consider the server room is often the brains of any organization. There are specialized systems that are manufactured for security cabinets in larger or often multi-user Data Centers.



With thefts of electronic equipment being more often in schools nowadays it is best to keep the classrooms locked. Having Electromagnetic Locks or Electronic Door Strikes to keep these secure provides a lock down capability Also in emergency situations these Doors and any door that provides exit to the outdoors will go from a locked position to an unlocked position to provide anyone the ability to exit the building without the need of interacting with the system.



There are specialized locks in the market that will allow these locks to be integrated into your access control system, this is done so the access control may be added to the cabinet instead of a door that does not need access control.

Key Control Cabinets:


Many organizations will still keep keys in cabinets such as for their fleet vehicles, and other keys for cabinets etc. Often these keys are in an area where a criminal can gain access to them. Having access control on these cabinets will add an extra measure of security as well as keep a log of who has accessed the cabinet.

Forms of authentication and how many do you require?

The goal of Access Control is allowing the entry of people. To accomplish this you are required to choose how they are going to prove that they have legitimate access to gain entry. There are forms such as “Multi-factor Authentication” which is very popular among security installers. You can have your system setup where dual or triple mode authentication is needed where the users need a pin number and a card or the card and a finger print. If the two do not pass, the entrance to the location is denied. This is best since it makes it harder for the unauthorized user to gain entry. This can be inconvenient to users that misplaced their card or forgot their pin code. This will make the entry to this person a hassle each time they come in until they get a new card or a new pin code. Because of this, having multiple factor authentication will increase the overall level of security of the facility. For example condos are usually single factor, Military Bases are triple etc..

What type of lock should be used?

There are many types of locks that can be utilized for access control, all having their own application.

  • Electric Strike:  This type will replace the doors mechanism with its own. The plate is installed and once the strike is energized it will allow entry.
  • Electromagnetic Lock: This type of lock utilizes magnetism. It is also know as “MAGS”, it consist of a coil wire around a metal core which will produce a strong magnetic field. The magnetic field will attract both plates together enough to keep the door closed. This can be measured in pounds. Security Camera King carries MAGS from 600lb to 1500lb.

What Proximity Reader should be used?

The Proximity Card Readers allow users to send a request to unlock the door and they come in a variety of options.



This is a very simple form for access control. The operator need to input his or her pin code to gain entry.

Card Reader:


There are many types of cards with their own type of encryption. Currently in the industry there are two – contact and contact-less.



Typically there are many of these readers and the most used is the Finger Print reader. There are others such as Iris, Geometry of hand and of course retina.

Whichever technology you choose to utilize, Form factor should be taken into consideration. Remember when I spoke about 3 Factor and single factor. Depending on the application is the reader that you would need. There are for example 12 inch square reader that may be positioned at the parking garage or miniature or thinner readers on aluminum door frames. Generally speaking the distance at which the card can be read increases with the size of the reader and type of card.

How are the Readers Connected?

While the readers need to be located in entry and exit points they are required to send the data back to a panel or server which will handle the data and choose what to do with it. There are a few different ways to accomplish this. Some are TCP/IP while others require a serial connection. There are others that are wireless but they are not as efficient as a hard line.

Traditional Systems will use serial connections to link up the readers to the control panel. This is the most common but technology is changing and most boards will have their own Server built into them allowing the use of your existing network.

Do I need anything else at the doors?

When adding access control one thing to consider is your local safety codes. One that stands out is the use of push to exit or for example PIR that will notify the system someone is exiting. In the US, life safety code requires that there be a means to physically break power to the magnetic lock. In some facilities this is not used, as guests or personnel are required to utilize their Proxy cards or form of ID to exit the building .

What will Power my Devices?

Power supplies are a must when designing your Access Control System. There are different ways to tackle having a centralized power supply and this method is popular as it is easier to troubleshoot, but if the power supply goes bad the entire system does too. You can implement ways to have multiple panels for different sections to help with this scenario. There is also PoE (Power over Ethernet). A lot of devices nowadays are PoE compatible where only a Category 5 cable is needed to connect the device to the network and provide it with Power to operate.

Special Considerations?

In some occasions the use of access control is going to be different, here are some that you might run into:



There are two ways to restrict access to elevators. Restricting the call button to a card. This method will call the car only when there is a valid card used. This method will utilize a single reader outside of the elevator. The second one is a reader inside of the elevator and this method will allow the user to certain floors. Once the user has presented their card or key FOB to the unit it will light the floors in which this person can access and the floors that are not will not be lit, preventing the user from going up or down to these. This requires an interface with the elevators travel cable and it also requires every floors input / output to activate and deactivate each of the buttons.

Harsh Environments:


When utilizing access control in harsh environments the devices need to be explosion proof. This means that the device will not create a spark that can create an explosion. While there are many cards that are specifically designed for these environments, they are typically a reader inside of an explosion proof enclosure, readily available from electrical distributors, and easily fabricated in the field.



This is a function of certain types of access control that will allow the count of employees exiting the building via a designated reader or group of readers. This is done in case of an emergency. Security and safety staff may see how many guests or staff is still in the building. There are also specialized wireless readers that will allow a security officer to swipe or read employees or guests credentials as they reach each mustering point.


Basic Introduction to Access Control

Written By:
Thursday, November 14th, 2013


As the demand for security increments in houses and businesses, the innovation in technology to protect businesses is in its peak, and the accessibility to these products are reasonable.

If you are the owner of a business that requires certain amount of personnel to drive it, as well as offices, website(s), IT department, and a reception, you may be interested to know how many employees are coming into your offices, who can have access to certain places, and when can employees have access to these sites. An Access Control System is the perfect tool to help you with these demands.

An Access Control System is basically conformed of a Central Panel, a reader, a motion detection sensor, a PTE button, a door contact, and a door actuator.

The Central Panel is the main brain of the system, which has the capacity of controlling a total of two doors, up to twelve doors for single module, and most of these systems give you the choice to install extension modules, which may have the ability to control up to two hundred doors.

The Reader is the tool that will allow you to activate the door actuator to granted access to a specific room. There are different kind of readers in the market, some more secure than others. The most common type of Reader, is a Card Reader, which also have different type of cards with codes accordingly with the type of Reader ( it can be Wiegand Reader, Indala Reader, RFID Reader, Integrated Circuit Chip Reader ICC, Magnet Stripe Reader, Bar Code Reader, keypad Reader, or a combination of any of these, etc.), these readers give you some level of security due to the fact every individual will possess and uses the same card every time they need to get access to the site. A more secure Reader will be the Biometric Reader, which has the ability to capture and record a finger print (usually the index finger) and uses this as the method of identification for every individual. These type of readers are more expensive due to the efficacy and advance technology. Even more secure and, of course more expensive, are the Iris Scanners, which can read and record the iris of the eye of a person, and use it to identify the individual.

Interested fact, there used to be out in the market, a Palm Reader, that used the size of the palm of your hand to identify you in the system, but it didn’t last longer, because the size of the palm of your hand is not a unique size, in other words, there are several individuals around the world that can have the same size of the palm of the hand, as yours.

A PIR Motion Sensor (Passive Infra Red Motion Sensor), is a device used to detect the traffic coming to the door you are controlling with the Access Control system. When the PIR Motion Sensor detects people coming close to the range set to detect with this sensor, it will send a signal to the main panel to execute an action, in most cases to deactivate the door actuator. This sensor is required in every Access Control System that has a reader on the other side of the door, because it allows people to come out of the building in case of an emergency.

A PTE button (Push To Exit), is also an element required specially if your system is going to be inspected by City Inspectors, because this device allow you to deactivate the door actuator, in case of an emergency, by pushing the button.

These two devices (PIR sensor and PTE button) are always installed in the same side of the door, which is the opposite side for the location of the Reader, most of the time the PIR sensor will be located in top of the door (or the ceiling close to the door), while the PTE button will be located next to the door (or a wall close to the door).

A Door Contact allows you to keep track of the position of the door that is being controlled by the Access Control system, and with the help of an Access Control Software, it also can help you count how many times the door has been opened and closed. This device is also a good complement for an alarm, which it will activate an output, usually a buzzer or siren, to let people know the door is being held open for a long period of time.

A Door Actuator is the device that will perform the action of lock and unlock, latch and unlatch, or hold a door open or closed.

There are several types of Actuators, some of them are:

Electrical Strikes, Magnetic Locks, and Door Holders.

The Electrical Strike are used in doors designed to open and close with latches and knobs, and they are generally used indoors like IT rooms and conference rooms. They holding capacity can be up to 300 lbs torque, and they are easy to break-in if you manage to push the latch of the door in.

Magnetic Locks on the other hand, are capable of handle between 600 lbs and 1200 lbs of torque to hold the door close, they are mostly used in outdoors, on glass doors with metal frames, double doors and doors that use locks and keys instead of knobs and latches. The con of using a Mag Lock is that you have to make sure your Access Control system is backing up by a rechargeable battery or UPS (Uninterruptible Power Supply), because the Mag Locks has to be constantly power up for it to work properly.

Door Holders are the type of doors that will stay open for a determinate period of time, this type of doors are mostly used at Handicap Access ramps, and this is the only doors that will have PTE buttons located on both sides of the door (outside and inside).

An Access Control system is powered by 12V or 24V power sources, depending on the type of specifications from the manufacturer. Some of them are capable of handling both Voltage.

The latest Access Control system consist of Smart Readers, which eliminates the necessity of a Main Panel or Central Panel, because everything is integrated in the Reader, and the only connections needed are from the controlled devices (Card Reader, Mag Lock, etc), the power supply, and Ethernet to establish connection with the server and the software to program and control the Reader. These type of readers are commonly used in small offices, and to control doors from different offices located in different buildings.