DoorAccess

Standalone access

AK28 keypad AK28 keypad

Network access

Audio GSM intercom kit Audio GSM intercom kit

Smartphone access

Video intercom kitVideo intercom kit

Video access

Video intercom kit Video intercom kit

 

Standalone access

The essence of standalone is when the access point and processor is all on the door post. 

Standalone is not high security if a door could be opened by breaking into wiring on the un-secured side of the door. Although most devices are standalone, and so low security, simple wiring and convenience makes them the most common access control.

 

 Keypad

Probably the most common door access control, mostly for low security applications. Simple codes or PINs (personal ID numbers) are easily passed from person to person.

 

 Card Access

Card access is more secure than keypads. A card or tag is required, but could be loaned. Some access controls use both card and PIN for extra security. 

 

 Other Access

Other personel access controls for doors and gates that qualify as standalone are.... 

GSM relay
Wifi relay
Human recognition
Facial recognition

Network access

Moving the processor to a secure area makes wiring more diffucult which can lead to reliability issues.

Controllers connect to any access point with a  Wiegand standard output. That can include   

  • Keypads
  • card readers
  • QR readers
  • Biometric readers
  • Barcode readers

 

Mini controllers

Mini controllers serve two doors, or an in and out reader on the same door. Some versions are programmed through the access poiy, some are set via a WiFi connection. 

Network controllers

Network controllers are controlled via a server, and potentially from an off site location. A laptop or desktop loaded with the editing tool connects to the network controller via TCP/IP. The database is held within the controller, so runs independantly. 

  • 2,4,or8 doors per controller using a shared database
  • Secure admin editing, possibly via the cloud
  • Local autonomous operation

Wiegand readers

Wiegand is a hardware and software data standard for an input device to connect to a controller.

There are several variations, the most important being data length. Most are 26 or 34 bits.

 


Smartphone based access controls

 

Technologies that use mobile phones for access control are increasingly popular. Phones have sophisticated means of identifying their own, by PIN or biometrics. It only requires wireless transmission to the access controller. 

 

Wireless access

Access control devices have a smartphone app for editing, monitoring and to activate the internal relay. 

 

GSM relay

This GSM relay has a network SIM to receive calls from a mobile phone or land line. When the call is received, the relay drops the line so as not to incur a caller charge. If the call is from an authorised number, the relay is activated. The unit can also send a text message to an 'admin' number.

WiFi relay

A WiFi relay makes a 2 way connection to a smartphone via a dedicated app. The app has buttons to operate the relay, and can read an input status such as if the door is open or not.


Video based access controls

 

As artificial intelligence (AI) becomes a standard feature in cameras, the processing power is employed to identify faces, finger prints, irises, and car number plates.

 

HRS Human Recognition Sensor

HR sensors are the first of a new class of devices using advanced video AI processing. HR sensors are taught  Human the gait. Applications are intruder detection, and activation by humans only.

A unique application for the Human Recognition Sensor (HRS) is to monitor the area around an automated gate for human safety. 

Facial Recognition Camera

A facial recognition camera stores facial data of each of the users. The realy output can activate a door or turnstile when the live face matches the data points stored.

Users naturally look up to the camera as they approach, as they did when their image was stored. The camera can store 500 users. 

Numberplate Recognition

The ultimate vehicle recognition technology is NPR, because it identifies the vehicle, not the driver, or an ID device inside the vehicle.

NPR is accurate when it makes a positive ID, but some poor plates will come back with no positive ID. The security is underwritten by the state's intollerance of missing, damaged, or false plates.


We can't find products matching the selection.