Keep Unwanted Traffic Out
A magnetic door lock keeps the door secure until an authorized key card gives the signal to disengage
Controlling unauthorized entry into buildings, lobbies, foyers, or work areas is an increasing concern. As we hear almost nightly on the news networks, there are alarming incidents of workplace violence and intrusion crimes.
Architectural structures used as “barriers” have been around since the beginning of mankind. The difference today is that we can now allow access electronically, and, likewise disallow access. Your entries and exits are capable of being controlled by time of day and day of week.
A secretary or receptionist may buzz you into an area, or you may usean “authorized use technology” that will simply open or unlock a secured door when you present it. “Authorized Use Technologies” generally consist of two component parts; the component carried or supplied by the individual (a code, a device or a body part) and the “reader” component (gathers the user information from his carried component).
Commonly used technologies include, Keypad Codes, Swipe Card (magnetically read or visually read using a Bar Code). They also include an “Embedded Technology” such as “Weigand Cards” which are more secure that the other methods of identification. Pictures may also be printed on these badge-like technologies for additional verification of the user’s ID.
Another type of carried technology by a user might be a “proximity tag or key”. This technology really never touches a surface in order to be identified. Like its description implies, one simply presents the device (commonly carried on a key ring, pinned or clipped to clothing, or worn on a lanyard). Readers mounted near the door utilize radio waves to exchange information.
Beyond these methods of identification, there are “biometrics” which utilize specific unique characteristics of the human anatomy. Examples are Finger Print Scans, Retina Scans, Face Scans and Voice Recognition.
Access Control Systems may be simple “stand alone” systems which just unlock doors or “archiving systems” capable of micro-managing these tasks specifically as directed. Contact a Shield Alarm Professional today for a free consultation and estimate.