Card access systems
A security system that allows users to access doors with an electronic keycard ( a plastic card that has a magnetically coded strip scanned in order to operate a mechanism) instead of a traditional key. Card access system controls the access at different level of the organization and keeps track of customers, employees, contractors, and other personnel accessing certain areas of your facility.
TABLE OF CONTENTS
How does electronic card access work?
Types of cardholder credentials
Key Fob and Micro Tag
How card access systems benefit your Business?
Tips to Improve Business Security
How does electronic card access work?
Card access systems works in a relationship between a plastic card and an electronic access control locks. Depending on the system, the card may contain a coded magnetic stripe that needs to be swiped into the card reader or metallic engraving that are used to trigger magnets inside the device, or even RFID technology. RFID cards function in the similar pattern except in this case, the card is brought into close proximity to a sensor. At this time, the reader, creates an electromagnetic field that is able to transmit its number or code to the reader through electronic circuit to the access control panel, which verifies if the number or code matches an approved number in the database. If the card is valid, access is granted, the door is unlocked for a short time and the entry or exit is recorded. If access is denied, the door remains locked and if someone attempts access, it gets recorded. The system also monitors the door and alarms if a door is forced open or held open for a long time after being unlocked. Each card is coded to respond to a particular card reader, a lock or a set of locks and an individual card is programmed by a computer with a unique electronic signature.
Types of cardholder credentials
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Barcode cards” subtitle=”Barcode card outranked the Holecard system with innovative infrared technology.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]An unique individual bar code is created to match with a particular lock. The code is printed on a card, works similar to the bar code found on many products. When the bar code is placed under an electronic scanner, it unlocks the respective door. The drawback to this system was bar codes could be forged and the electronic reader can be easily fooled. These cards lost popularity with the invention of the magnetic strip keycard.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Magnetic strip keycard or Swipe cards” subtitle=”It’s a thin metallic strip on the back of the card, just like a credit card. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]This card is swiped through a scanner, functions by running the magnetic stripe over a sensor that reads the contents of the stripe. The stripe’s data is compared to the data that is either stored locally in the lock or those of a central system. If the content is valid, access is granted by authenticating with an electronic signature on the card, otherwise the access is denied. These keycard access are more secure than the previous ones. Magnetic strip keycard systems are widely used in the workplace security and hotels.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Weigand cards” subtitle=”These system set the keycode permanently in the card using magnetic wires.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]The code cannot be reprogrammed as magnetic strip cards or erased by magnetic field. Many electronic access control locks use a Wiegand interface to connect the card swipe mechanism to the rest of the access control system.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Radio frequency identification (RFID) Proximity cards” subtitle=”It uses the newest technology. RFID cards have a radio chip embedded inside the card that uses sensor. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#05a9e2″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]By bringing the card in close proximity to the respective programmed reader, the door unlocks. It uses microchips and radio technology, providing highest level of security and the most difficult to forge. The benefit with RFID cards is that they do not need to be removed from the wallet or pass holder, the keycard reader can usually read them from a few inches away. They are most widely used in commercial office spaces.
[/chiac_divi_accordions_item][/chiac_divi_accordions]
Key Fob
Micro Tag
Small tag sticker that uses HID proximity technology. Converts a photo ID to a proximity card by tagging into a nonmetallic device. It easily attaches to a mobile device and other objects.
How card access systems benefit Your Business?
What information is been stored in the system?
- Date and time of credential read
- Unique ID number or badge number
- Name of credential holder
- Name of door or reader being accessed
- Access granted/denied condition
Many businesses desire this kind of audit trail, especially banks and IT industries.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Multiple locations” subtitle=”Several properties can be monitored from one location or server. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]Businesses can monitor security control over several buildings located in a large geographical area. Rather than remembering the multiple codes, a system can be coded to accept keycard access at multiple locations. Different rules can be implemented for different locations. For example, at one location, the employee has complete access, at another they have only business hours access, and at a third they have to be approved every time.
A keycard access allows a company to monitor all office locations located around the world from a centralized main office. Regardless of the technology – swipe, RFID, or Bluetooth – one governing system will control the entire facility. Cities can keep track of several buildings throughout a large area.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Restrict access” subtitle=”This is a huge benefit to the businesses with a simplified process of granting and revoking access to employees.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]In the past, with a lock and key system, when an employee left the company or was terminated, or a key was lost, the entire facility would need to be rekeyed for security purpose. With keycard, the process becomes lot easier. An authorized person needs to access the credentials record and deactivate the employee’s keycard access.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Grant Access” subtitle=”Granting access works in the similar way like restricting access.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]When an employee onboards in the company, an authorized person simply accesses the credential manager or other management tool and adds or activates a card for that employee.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Improve productivity” subtitle=”Keycard makes the process productive because the employees are responsible for their locations in the facility.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]Helps to keep track of team members and increase overall productivity.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”No Unauthorized Written Records” subtitle=”The system set the keycode in the card which cannot be physically stolen unless the employee writes the code somewhere. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]It should always be remembered that keycard code shouldn’t be written anywhere for personal and business security.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Implement a lockdown procedure” subtitle=”Its beneficial during emergency situation. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]Access can be granted or revoked without the need to update the entire lock system.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Logging Access Activity” subtitle=”Audit trail obtained by recorded log activity for every individual since every card is unique. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]The log activity includes who accessed the facility, how much time that person was in the facility and how many times the facility was accessed by that individual. This is helpful during theft or missing information.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Easier to Change” subtitle=”A keycard is a physical object and it can be stolen.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]Since each card is unique, replacing it and locking out the old card is easy. Once the old card is deactivated, it can never be used. Alerts are sent if anyone tries to use the card before deactivation. The new card has a unique signature from the old card, which means the employee can be granted access without concern over who has the old card. This is a much easier process for an employee than memorizing a new key code.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Difficult to duplicate” subtitle=”In the past, with lock and key system, the physical keys could be copied very easily.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]But with keycard, its nearly impossible to duplicate an electronic key because it has a higher degree of sophistication with advanced technology making it more secure.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Reduce Windshield and Repair Time” subtitle=”If a tech needs different access to handle an emergency in the field, his or her rights can be updated. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]This way, the tech can travel directly to the emergency without returning to the office, reducing costly windshield time and accelerating repairs.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Flexible – can be used for External or Internal Access Control” subtitle=”External control is used by businesses or organizations who want to control access to their facilities. ” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]Examples are storage facilities, manufacturing sites, college dormitories or other businesses. Other uses are for parking garages. These system can require an entrance and exit before the same card can be used again in order to control parking lots.
Key cards are used for internal doors to control access to highly sensitive areas such as hospital supply rooms, guard shacks, or IT areas where private information is stored. Schools use them for classrooms to prevent theft and restrict access to certain areas of the school such as the computer labs. Hotels or apartment buildings also use internal card entry systems in elevators to restrict access to adjust the floor guests or tenants and are very common for jails and courthouses to restrict access to certain levels. Keycard access is also used in the public areas of the building such as the lobby or the restaurant floors.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Individually programmed” subtitle=”Entry key cards are programmed for each individual, allowing businesses to customize access for each person.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]A business can choose to grant full access or limit access during scheduled times. This has many practical applications. Just to cite examples : managers may be given full access while limiting access for regular employees to just the office hours of 7:00 am to 5:00 pm. Or stock custodians may be granted access to storerooms, but other employees may be restricted.
[/chiac_divi_accordions_item][/chiac_divi_accordions][chiac_divi_accordions chiac_toggle_speed=”250″ _builder_version=”4.16″ animation_style=”fade” global_colors_info=”{}”][chiac_divi_accordions_item title=”Pair with Video Surveillance system” subtitle=”Pairing with video system allow visual supervision of individuals entering and exiting the facility.” chiac_title_bg_color=”#ffffff” chiac_select_fonticon=”R||divi||400″ chiac_l_icon_size=”25px” chiac_l_icon_color=”#7cda24″ chiac_l_icon_color_o=”#05a9e2″ chiac_r_icon_rotate=”on” _builder_version=”4.16″ chiac_title_level=”h2″ chiac_title_font=”|700|||||||” chiac_title_text_color=”#000000″ chiac_title_font_size=”26px” chiac_subtitle_level=”h4″ chiac_subtitle_font=”||||||||” chiac_subtitle_text_color=”#000000″ chiac_subtitle_font_size=”23px” global_colors_info=”{}”]For additional security, companies choose to pair access control systems with video surveillance to ensure authentication on entry/exit of the facility. Once access is granted, video surveillance is activated in the particular door being accessed making it easy to verify the person’s access to that facility.
[/chiac_divi_accordions_item][/chiac_divi_accordions]
Tips to Improve Business Security