Human Access control

Overview

Access Control Systems determine who is allowed to access, when and where he/she has access to. Also, these can be useful for monitoring access to a specific zone. It is almost impossible to control sensitive areas of an organization individually using traditional methods, because today’s workplaces contain many personnel and sensitive organizational areas. Different parts of an organization including data centers, R & D departments, laboratories, finance section and treasures, parking lots, electrical rooms and even elevators have to be monitored and controlled. Anyone is not allowed to access to each section and organization’s resources.

The use of video monitoring systems for security has already been common. This request and process is growing continuouslyin the world, but it should be noted that video monitoring systems are among ” passive” systems; this means that they do not automatically prevent the unauthorized person; however, Access Control Systems are among the “active” systems namely
these prevent unauthorized persons from the access.

this way, many organizations in the world as well as our country, Iran, in addition to use of video monitoring systems, also utilize the traffic control systems. And perhaps they give more importance to ACS systems.
Here, an significant point can be cited: Integration of traffic control systems with video monitoring systems and generally other security systems (e.g. fire alarm) and management systems (such as building management, payroll systems, etc.) are the future needs of organizations. We suggest that you choose now a system to be ready for this integration.

In access control systems, special tools are used to identify a person:
RFID Cards, Pin code, fingerprint, long- range cards, and recently face detection are common methods for identifying a person. These are used in different parts of an organization according to appropriateness and necessity.

The access control system design shall be a modern framework for system integration and operational control that is capable of future expansion and enhancement. The design must be based on open IT communication standards and use conventional databases. The access control system should be built on an ‘open architecture’. This refers to the structure for data management and communications which should use common ‘open’ database and communications protocols.

The design shall distribute functionality to the process controller level so that the security policy is managed at a local level rather than at the central level, so to create a robust and responsive solution. You should also be able to manage or monitor centrally for the whole access control system.

It should be mentioned that Access Control System sometimes is named Traffic Control System, although the “traffic” is considered a type of “access” and access to the computer and the printer (despite not being traffic) are among Access Control Systems.