Controlling and Tracking Access

In todays security conscious world, facility executives need an effective yet easy means to protect their facilities and business. The answer for corporate, manufacturing and institutional executives alike could be as simple as a one-card approach -- using a smart card.

For companies that choose a card access control solution, but are using different systems at different facilities can create complications.  This can cause confusion when trying to track which cards access which facilities.  Tying them together requires integration between various access control systems and single smart card. 

Card readers are placed wherever a company determines access must be tracked. Todays electronic access control options include a wide variety of card readers that are hard-wired to control panels, which are then hard-wired or networked to a host computer containing one or more security databases. 

SNCTechnologies helps work through the challenge of selecting the right technology for a specific situation.

SNCTechnologies has a range of cards that incorporate technologies to meet all types of business requirements from 125KHz proximity cards to 13.65MHz smart cards with or without magnetic strips and RFID cards.  A suite of high quality access control readers deliver maximum choices to meet all project and card requirements.  Cards and readers can be programmed and assembled to work within the master plan, operational, performance and budgetary objectives.

 

Access Control Systems Capabilities

  • Access control systems are networkable
  • Each cardholder can be assigned unique access security levels
  • Cardholder locations can be tracked to prevent two people from sharing a card
  • Cards can be programmed with specific lock-out times
  • Access control systems can be integrated with time and attendance software packages
  • Proven technology
  • Consistent, robust and reliable access control
  • Low Replacement card cost
  • Reusable/reprogrammable cards

 

Magnetic access control card readers read the information on the magnetic stripe, transmitting it to the access control point.  These are typically seen on credit cards and door cards in hotels and other institutions. These readers are also available with keypad to provide additional security, requiring the card holder to key the correct PIN prior to access being granted.

  • Proven technology
  • Consistent, robust and reliable access control
  • Low Replacement card cost
  • Reusable/reprogrammable  cards

 

RFID Cards

Radio Frequency Identification (RFID) cards and RFID Access Control Keypads offer a way for controlling access safely and automatically and is perfect for use in the office, factory, mining, industry and other applications. The access controller can provide users with more convenience by connecting to terminals, including a button for opening the door, doorbell, and electric lock that is normally open or closed. There is also a connection for an external release exit button.

RFID readers haves a capacity of 500 users (each card has one password). This system does not need to connect to a computer.

How RFID Cards Work

Systems that make use of RFID technology are typically composed of three key elements: 

  • An RFID tag, or transponder, that carries object-identifying data
  • An RFID tag reader, or transceiver, that reads and writes tag data
  • A back-end database, that stores records associated with tag contents. Each tag contains a unique identity code

An RFID reader emits a low-level radio frequency magnetic field that energizes the tag. The tag responds to the reader’s query and announces its presence via radio waves, transmitting its unique identification data. This data is decoded by the reader and passed to the local application system via middleware. The middleware acts as an interface between the reader and the RFID application system. The system will then search and match the identity code with the information stored in the host database or backend system. In this way, accessibility or authorization for further processing can be granted or refused, depending on results received by the reader and processed by the database.

A Smart Card, typically a type of chip card, that is a plastic card that contains an embedded computer chip–either a memory chip or microprocessor type–that stores and transacts data. 

A key advantage of smart cards is that they can be integrated with different technologies, including proprietary proximity, magnetic-stripe and biometric systems. That allows smart cards to be used in different locations with different technology readers. 

Another consideration is existing hardware and software, which was based on specific needs at the time of purchase. Expansion of these systems to accommodate smart card technology is possible but may require upgrading, or purchasing hardware and software to integrate into a smart card single card system.

A Smart Card that is programmed to be read by different types of readers, or by a multi-technology reader at different locations, is expandable through the addition of new access control panels and readers. 

Logical Smart Cards

Smart cards can also help protect corporate information networks — so-called logical access control, as compared with physical access control for entry into a facility. IT departments seek logical access as a lock on a company’s computer network. In a logical access control system, a users smart card is inserted into a card reader linked to the cardholder’s workstation. Logical access using a smart card reader provides better security than a password because employees often fail to log off their workstations at the end of a day, allowing others to access sensitive company files. The smart card solves that problem because removal of the card unlinks a workstation from a company’s computer network

 

How Smart Card Works

Biometric Card System Components and Process

Four major components are usually present in a biometric system :

  • A mechanism to scan and capture a digital representation of a living person’s biometric characteristic.
  • Software to process the raw data into a format (called a template) that can be used for storing and matching.
  • Matching software to compare a previously stored biometric template with a template from a live sample.
  • An interface with the application system to communicate the match result. The Role of Smart Card Technology with Biometrics Smart cards are widely acknowledged as one of the most secure and reliable forms of electronic identification. To provide the highest degree of confidence in identity verification, biometric technology is considered to be essential in a secure identification system design. Combining smart card technology

With biometrics the means to create a positive binding of the smart card (a difficult-to-clone token) to the cardholder thereby enabling strong verification and authentication of the cardholder’s identity.