Security & Surveillance Systems
Security & Surveillance Systems
• Control Panel: The control panel is the central hub of the access control system. It houses
the processing unit responsible for managing access requests, verifying credentials, and
controlling the locking mechanisms. Modern control panels often include network
connectivity for remote management and integration with other security systems.
• Credentials Readers: These devices are used to read the credentials presented by
individuals seeking access. Common types of credential readers include:
1. Card Readers: These read information stored on access cards or key fobs.
2. Biometric Readers: These devices use biological traits such as fingerprints, iris patterns, or
facial recognition for identity verification.
3. Keypad Readers: Users enter a PIN code to gain access.
4. Proximity Readers: These readers detect proximity cards or key fobs without requiring
physical contact.
• Credentials: Credentials are the means by which individuals are granted access to a
secured area or resource. These can include access cards, key fobs, biometric data (like
fingerprints or iris scans), PIN codes, or a combination of these methods.
• Door Position Sensors: These sensors monitor the status of doors, ensuring that they are
properly closed and secured. They are used to trigger alarms or prevent access when
doors are propped open or left ajar.
Components of Access Control Systems
• Request-to-Exit (REX) Devices: REX devices allow individuals inside a secured area to request exit by triggering the unlocking
mechanism. Common types include motion sensors, push-buttons, or touch-sensitive devices.
• Wiring and Connectivity Infrastructure: Access control systems require appropriate wiring and connectivity infrastructure to
interconnect all components. This includes power cables, data cables, and network connections.
• Management Software: Access control systems are typically managed through specialized software. This software allows
administrators to configure access permissions, manage user credentials, view access logs, and monitor system status
remotely.
• Integration Interfaces: Access control systems may need to integrate with other security and surveillance systems, such as
CCTV cameras, alarm systems, or intercoms. Integration interfaces enable communication and coordination between these
systems to enhance overall security and situational awareness.
• Backup Power Supply: To ensure continuous operation in case of power outages, access control systems may include backup
power supplies such as batteries or uninterruptible power supplies (UPS). These provide temporary power to critical
components until normal power is restored.
Access Control System Topology
Access control systems can be deployed in various topologies depending on the size and complexity of the installation. Common
topologies include:
• Standalone Systems: Basic systems where each door has its own standalone controller. User credentials are programmed
directly into the controller at each door.
• Networked Systems:
– Centralized: All controllers are connected to a central server or controller, which manages access permissions and user
data.
– Distributed: Multiple controllers are distributed across different locations, but they communicate with a central server for
coordination and management.
• Cloud-Based Systems: Access control data and management software are hosted on cloud servers, allowing for remote access
and management from anywhere with an internet connection.
• Hybrid Systems: Combining elements of standalone, networked, and cloud-based systems to meet specific requirements or
address scalability and redundancy needs.
The topology chosen depends on factors such as the size of the facility, the number of access points, desired level of control,
scalability, and integration with other security systems. Each topology has its own advantages and challenges in terms of installation,
management, and security.
RFID & card based systems
RFID (Radio Frequency Identification) and card-based systems are popular implementations of access control systems, offering
convenient and secure means of managing access to buildings, rooms, or resources. Here's a closer look at RFID and card-based
systems:
• RFID Tags: RFID tags are small devices that contain electronically stored information. They come in various forms, including cards,
key fobs, or stickers.
• Readers: RFID readers emit radio waves to communicate with RFID tags. They can be fixed at entry points or portable for mobile
applications.
• Antennas: Antennas are part of the RFID reader system and transmit the radio waves used to communicate with RFID tags.
• Controller/Backend System: Manages the communication between RFID readers and the access control system's backend. It
processes the data received from the readers and determines whether to grant access.
• Credentials: In RFID systems, credentials are typically stored on RFID tags. These tags can be passive (powered by the reader's
signal) or active (contain their own power source).
• Access Cards/Key Fobs: These are common forms of RFID credentials carried by users for access control.
• Authentication Protocols: RFID systems use various authentication protocols to ensure secure communication between readers
and tags, such as AES encryption or challenge-response mechanisms.
• Integration with Other Systems: RFID systems can integrate with other security systems like CCTV cameras, alarms, and biometric
readers for enhanced security.
RFID & card based systems
Card-Based Systems:
• Access Cards: Access cards are physical cards containing user credentials in the form of magnetic stripes, barcodes, or embedded
chips (like RFID).
• Card Readers: These devices read the information stored on access cards to authenticate users. Card readers can be mounted on
doors, turnstiles, or other access points.
• Controller/Backend System: Similar to RFID systems, a controller or backend system manages access permissions and user data. It
communicates with card readers to grant or deny access based on the information read from access cards.
1. Magnetic Stripe Cards: Utilize magnetic stripes to store data. They are commonly used but can be vulnerable to cloning.
3. Smart Cards: Embed microprocessor chips for enhanced security and functionality.
4. Contactless Smart Cards: Similar to smart cards but do not require physical contact with the reader.
• Software Integration: Card-based systems often integrate with access control management software for centralized administration,
user credential management, and reporting.
Both RFID and card-based systems offer flexibility, scalability, and varying levels of security, making them suitable for different access
control requirements. The choice between them often depends on factors such as security needs, budget, ease of use, and existing
infrastructure.