Access Control is highly customizable in many ways. Card readers, keypads (passcodes) can be a part of the process along with fingerprint, hand and eye authentication (Biometrics). Access Control readers and biometric technologies are available in a variety of forms, shapes and access points. In order to determine what you need, we review and analyze your current system needs and future state requirements as your company grows in scope, size and security.
Card readers are the most popular type of reader employed for access control solutions. These function by having the user hold a card in front of the reader, the reader sends out a current and the card responds with its information contained within. These readers are very easy to use and program and ensure the security of your building, because no keys can be lost. Furthermore should a keycard go missing, the users card can immediately be deleted from the system and a new one can be programmed. With encryption technologies these cards are very secure to use.
There are a variety of readers available that can allow authorized users to gain access and keep intruders out. Some of these may include key switches, card swipe readers, motion triggers and long range RFID readers. Regardless of the application there is a reader available for it. Most of these readers have their own unique way of ensuring the user trying to gain access is authenticated. Our experienced design team can help you decide which reader you may require for your application. Most systems allow to have different readers for different applications as well.
Biometric readers are a very specialized type of access control reader. These rely on the unique qualities of the human body. There are a variety of readers that will authenticate a person trying to gain access by scanning their fingerprints, facial features, iris and more. Since all these features are unique to every person, only that specific person can gain access. These readers also allow for dual authentication, so that a keycard has to be presented to the reader, and the biometric feature has to be presented right after. Providing even tighter security. Read more here.