Ask the Expert

Ensuring only the right people enter and exit a facility is the core principle of access control. It is extremely important that only approved people have entry authorization. Access control can be managed in different ways, but one of the most popular and effective methods is with identification cards. A multitude of different ID cards is available. How can you use them for your next security installation?

ISSUE:What are some ID card choices?

SOLUTION: The most common form of access card is probably in your wallet right now: the magnetic stripe card. Found on the back of credit cards and most driver’s licenses, these black magnetic stripes contain information. Once swiped through a reader, the information taken from the card allows the user to complete a transaction or enter a building.

Newer forms of magnetic stripe cards, dubbed “smart cards,” have small chips that can store more information. Smart cards are more functional and secure than other alternatives and can include biometric data to offer an even higher level of security.

ISSUE: What are the latest advances in smart-card technology?

SOLUTION: Newer versions of smart cards enable contactless technology, which means that the card does not need to be passed through a reader. RFID technology only requires the user be close to a reader for the card to be used.

Implementing an access card system within your security apparatus is made even easier by products that allow cards to be made on-site. Schools and businesses can take a picture of an employee or student and feed the image into the printing software. The card printing machines will then produce a working version of the organization’s identification card to use.

Some universities have extended their use of ID cards with smart-card technology and may require students to swipe their cards before gaining access to buildings such as the library or dining facility. Further functions enable tracking of student meals through the ID card; parents can even create an account to deposit money into, which the students can access through their campus ID smart cards. They also can access other bank accounts, such as personal checking or savings, effectively making the campus ID card an ATM or debit card.

ISSUE: What factors should businesses consider when implementing an ID program?

SOLUTION: Businesses can use any variation of the ID card to ensure only approved personnel enter a building. Functions also can allow either full or restricted access to a facility—you can define admission only to certain areas or grant admission only at certain times. The control can even be extended to immediately invalidate a terminated employee’s card or to approve access for temporary employees or vendors requiring longterm access to the facility. Of increasing importance today is the ability to centrally and completely disable an employee or student ID when their permission to use the campus has been removed. Organizations that use these cards also may have the ability to track information on a user’s location, habits and interests.

ID cards are an essential tool for access control and secure organizations. It is now easier than ever to implement ID cards in a security system. Talk to a security integrator about the benefits and start making money by implementing the technology as soon as possible.

READER QUESTION: I operate a small manufacturing facility.We have a need to strengthen security in one sensitive area and are considering adding a biometric device. But a fingerprint reader will not work, as our employees often have their hands full with heavy parts. That might also make it difficult to use a retinal scanner. Do voice or other biometrics work reliably, and are they affordable?

SOLUTION: Mr. “Hands-full” probably would be best served by using a smart card or at least a proximity card that does not require anything additional. If high security is really necessary, a retinal scan device or even a voice recognition system may be useful. But these systems are in the higher price bracket and require more intimate contact, which many people object to. In a shop environment, it is possible these devices could be affected by dirt and high noise level.

Another solution could be to use a combination of prox card and video recognition system, especially if video is going to be deployed anyway. The card reading can call up an anticipated profile in the video system and do a facial recognition test, comparing the template to the live image of the presenter. The integrated access control/video system then decides whether to grant access based on how close the presenter is to the template on file. Facial recognition technology is still evolving but currently has good accuracy, is fast, is reasonably priced when added to a video system and is definitely user friendly. Once installed, accuracy can be raised by tightening the acceptable parameters of the facial recognition software. A secondary advantage is the ability to record on video all valid and invalid entry attempts.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.