An access control system is, by its very nature, a system for identifying users, recognizing 'your' or 'stranger' and, if it is 'your', what is allowed to do. Access control systems are used to restrict access, determine arrival and departure times that allow you to calculate time spent or absent, to start or stop any process or activity.
As an identifier, the access control system shall use:
Codes
Combinations of identifiers are commonly used to increase the level of security.
Commonly used access control systems consist of a controller, or a group of controllers, that store information about users and their access capabilities and electromagnetic card readers that identify the user card. The security of card data uses information coding, two-way exchange or biometric readers.
Fingerprint scanners are more common among biometric readers, and less frequently other sensors for biometric readings.
No less important is the administration of users of the access control system, for which purpose the controllers are networked and connected to specially prepared workstations, from which new user data is entered, unnecessary user information is deleted and time and access level rights are granted.
The simplest example of an access control system is a door phone, which may be supplemented by an electromagnetic card reader or code encoder. Door phones can only be equipped with audio communication or supplemented with a video monitoring function. In the past, door phones were independent of the system, but with the growing popularity of computer networks, door phones that can use an existing local wired or wireless computer network are increasingly being used.