Electronic keypads - Expert commentary

Key-Centric Access Management System: Providing The Highest Possible Levels Of Security
Key-Centric Access Management System: Providing The Highest Possible Levels Of Security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Automatic Gates: Making The Right Investment For Access Control
Automatic Gates: Making The Right Investment For Access Control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

The Digital Transformation Of Modern Access Control Solutions
The Digital Transformation Of Modern Access Control Solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest Hirsch / IDENTIVE news

Identiv’s COVID-19 Response Solutions Support Enterprises And Government Customers In Reopening Of Global Offices
Identiv’s COVID-19 Response Solutions Support Enterprises And Government Customers In Reopening Of Global Offices

Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the threat of COVID-19 still around us, frictionless, hands-free solutions are a key part of any organization’s efforts to make a healthier, safer environment,” said Steven Humphreys, Identiv Chief Executive Officer (CEO). Identiv’s highly secure access and identity solutions address multiple business needs to re-open and grow" Steven adds, “Identiv’s highly secure access and identity solutions address multiple needs for businesses to re-open and grow again in the new pandemic-era normal.” Quick, affordable temperature tracking “As large public venues begin to reopen, quick, affordable temperature tracking will be the first line of defense to assure visitors and employees that operators have their safety at top of mind,” added Dr. Manfred Mueller, Identiv Chief Operations Officer (COO) and General Manager, Identity. Dr. Mueller adds, “For those not yet comfortable returning to work, secure network log-in options facilitate a bridge between on-site and telecommuting teams.” Identiv’s complete portfolio of COVID-19 response solutions include: Smart, frictionless access control MobilisID uses the latest in Bluetooth and capacitive technologies to allow complete frictionless access, no touching required. The MobilisID App (available via Apple iOS and Android) acts as a physical credential — the user can keep their mobile device in their pocket, wave their hand near the MobilisID Reader and the door automatically unlocks. MobilisID can also integrate with ADA-compliant automatic door hardware to form a complete touchless solution. With the Freedom access control system, no reader is even required at the door. Freedom’s software-defined architecture uses the location of a user’s mobile device to determine their proximity to a door for hands-free ingress and egress. The system can also be used in parallel with conventional reader doors. Frictionless, battery-less uTrust UHF Credentials work with identification applications that require long-distance reading (i.e., more than 18 - 21 feet). Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. The credentials can be read through badge holders, handbags, pockets, and  No-touch time and attendance uTrust 3721 F multi-technology smart card reader features multiple frequency options and a keyboard emulation. Perfect for employers who use a mixture of technologies for logical access, uTrust 3721 F leverages existing 125 kHz low-frequency (LF) or 13.56 MHz high-frequency (HF) cards. Out-of-the-box, uTrust 3721 F can work with most time and attendance systems, letting employees simply tap a card to the reader to clock in.  Nearly hands-free transactions and access With Near Field Communication (NFC) technology, it’s easy to get near an access point without ever actually touching it. Identiv’s NFC-enabled solutions feature a catalog of transponders compatible with NFC Forum created for secure contactless transactions and connecting electronic devices with a simple tap-and-go model. Designed for comfort and wearability, the uTrust Proximity Wristband keeps wearers from reaching for their phone or card every time they need to gain access to a parking garage, building, room, or elevator. A passive radio frequency identification (RFID) device, the no-battery credential is robust, resistant to cracking, and impervious to moisture.  Temperature tracking and contact tracing Identiv’s Body Temperature Measurement Patch is a wearable NFC-enabled transponder that supports the reopening of public spaces worldwide, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The patch also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity of using NFC and the smart technology potential of the Internet of Things (IoT), making body temperature monitoring easier than ever. Identiv has partnered with Telaeris to deliver a rapidly deployable, industry-renowned, mobile access control hardware and software solution that provides security in a variety of mission-critical situations where traditional systems cannot be supported. By leveraging Telaeris’ mobile credential verification hardware, Hirsch Velocity Software-based access control systems can go beyond protecting the perimeter and empower security staff to authenticate and authorize users with photos from anywhere, at any time, with real-time server synchronization. Telaeris handheld units with HealthCheck functionality can prompt staff to ask a series of health questions and input the taken temperature of a validated user to create a ‘health/access check’ profile upon entering which can then be repeated upon exiting. If a person enters a building and is later found to be symptomatic, Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. While this is useful during the days of COVID-19, it can also be used for other applications, such as the seasonal influenza. This means every office can be proactive in responding to potential outbreaks, while simultaneously providing employees with the peace of mind that there are measures in place to keep them safe.  Working from Home For some organizations, even as worldwide economies are restarting, employees continue to or are more comfortable working from home. Identiv’s smart card reader portfolio keeps work flowing while ensuring everyone’s data and health stays safe and secure. Top selections for secure network log-in while telecommuting include, uTrust Token Pro Mini Type A (smallest form factor, strong PKI, and Java Card technology, uTrust Token Pro Mini Type C (USB C and can feature user branding and applets), uTrust 2700R Contact (supports all PC operating systems and cards ICs), 0 USB (ultra-compact, CAC and PIV-approved, and available in USB C, uTrust 4701 F Dual Interface (combines contact, contactless, and NFC tech), and uTrust SmartFold SCR3500 A (USB A, ultra-compact, and CAC and PIV-approved). As the economy begins to open up and people around the world return to work, it’s critical to have solutions in place that keep employees and visitors feeling safe, comfortable, and confident.

Identiv’s Hirsch Velocity Access Control Platform Now Enables Contact Tracing For Hirsch Customers
Identiv’s Hirsch Velocity Access Control Platform Now Enables Contact Tracing For Hirsch Customers

Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19).  Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms.  Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.

Identiv's Hirsch Velocity Physical Access Control Solution Approved By The UK Center For The Protection Of National Infrastructure
Identiv's Hirsch Velocity Physical Access Control Solution Approved By The UK Center For The Protection Of National Infrastructure

Identiv, Inc. has announced that after extensive testing of its Hirsch Physical Access Control System (PACS) CPNI solution, the platform is now approved by the Center for the Protection of National Infrastructure (CPNI), the UK government authority for protective security advice to the country’s national infrastructure. CPNI-approved physical access control platform The CPNI works with partners in government, police, industry, and academia to protect the nation from threats and terrorism, only recommending physical security equipment that meets its stringent certification requirements.  “UK sites classified as critical infrastructure, where deep encryption standards are paramount, can confidently deploy the Hirsch CPNI-approved physical access control platform,” said Mark Allen, Identiv General Manager, Premises Security Solutions. Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities" Hirsch Velocity Software Mark adds, “Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities across the UK, the U.S., and other governments around the world. Our CPNI-approved Hirsch Velocity Software security management system provides a highly scalable, end-to-end physical access control solution from the door to the server cluster, ideal for mission-critical environments. He further stated, “We are proud to continue to work with the UK government’s risk-critical sites to provide the most robust, reliable, highly secure yet cost-effective access control solution.” Hirsch PACS CPNI solution The Hirsch PACS CPNI solution encompasses Identiv’s highly secure product portfolio, including Hirsch Velocity Software, Hirsch Mx-8 Controllers, and Secure Network Interface Board 3 (SNIB3). Identiv’s suite of advanced access control solutions is approved for use in some of the world’s most security-sensitive organizations, including many UK government agencies. Hirsch Velocity Software’s security management system is an integrated platform that manages access control and security operations across thousands of disparate facilities, from single highly secure rooms to multi-building, multi-location campuses, with the most stringent security compliance. Hirsch Mx-8 Controllers Users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitors as they move around a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. Hirsch Mx-8 Controllers provide scalable, networked communication and are also available in two or four supervised door models. The modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. The Mx Controller is fully firmware, function, and communication protocol compatible with Hirsch systems so that existing credentials, readers, and databases can be retained. SNIB3 communication device SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption. These features are already foundational for the critical U.S. FICAM security standard. For deployments already equipped with a Hirsch solution, SNIB3 is a drop-in replacement for Identiv’s SNIB2 and SNIB communications boards. Identiv Global Services Identiv Global Services (IGS) provides a comprehensive cybersecurity-hardening service to ensure the solution is deployed to the rigorous CPNI standard. This covers securing the operating system, database, and services, including all Identiv-supplied server components and networking equipment, as well as the Velocity client workstation. To protect against the rapidly evolving threat landscape, IGS through service-level agreement (SLA) supports the customer and the solution, updating security patches and applying the latest information assurance guidelines following UK standards and best practices.

Related white papers

School Security Moves to the Cloud

Cloud-based Access Control And Occupancy Management To Safeguard Workplaces

Four Areas to Consider in Frictionless Access Control