ARCH8282 A - Security Systems and Installations
ARCH8282 A - Security Systems and Installations
SELECTION CRITERIA
To be appropriate for each situation, the access control system must answer five questions:
1. Where? For what place? What type of access (isolated, internal or external, room,
building, floor, etc.), for how many doors?
2. Why? For what function, for whom? Management of visitors, groups, staff and events.
3. When? At what time? At what times is access permitted or refused? And for how long?
4. How many? How many people are concerned? How many sections or departments?
5. How many people are there in the groups? Which visitors are authorised, and which are
not? How? Which readers to choose? What wiring infrastructure to use?
COMPONENTS
An access Control System typically consists of a number of components from those that identify
a person to those that authorise access. They include:
1
1. Credentials - A physical or tangible object, a piece of knowledge or a facet of a person’s
physical being that enables an individual to gain access to a controlled area. They include:
Token/Cipher (code)/Biometric data - The ‘key’.
2. Readers - Devices used to electronically read the ‘Key’.
3. System Software/Controller - These intelligent devices hold information in a local
database required to decide whether a user is allowed through a door at a given date and
time. The controller should also be capable of working off-line should the network
communications fail for any reason.
4. Electric Lock Hardware – Maglocks, Shearmags or Shearlocks, Electric strikes, Solenoid
Locks, Solenoid handle locks.
5. Access Controllers – Doors, Turnstiles. The major difference between turnstiles and doors
is that turnstiles restrict passage, usually allowing only one person to pass at a time.
Turnstiles provide an effective method of controlling personnel entry in heavy traffic areas
and also provide a means to reduce possibility of “tailgating.” Tailgating refers to one or
more persons following an authorized person through the control point into the secured
area. For example, a valid card is inserted into the card reader opening the door to the
secured area and two individuals pass through the door. The turnstile design permits only
one person at a time to pass through, reducing the possibility of tailgating.
2
6. Power Supply Units (PSUs) - The power supply requirements should be carefully checked
to ensure that all necessary door hardware, including the chosen locks, can be supported
simultaneously. It may be necessary to utilise a separate power supply for controlling the
lock hardware.
3
CLASSIFICATION BASED ON CREDENTIALS USED
PHOTO ID SYSTEM
Systems requiring less manpower that use closed circuit television (CCTV) and either a stored
image or a picture badge to compare with the person seeking access are also available. In systems
using the stored image, the individual controlling access, likely located at a central location,
compares the stored image of the authorized person with the person seeking access on the CCTV
monitor and allows access remotely.
Swipe – Swipe cards use a variety of technologies including magnetic strip to hold identification data.
This is read into a reader by swiping or inserting. Swipe cards are usually cheap but easily copied and
deteriorate over time, needing to be replaced quite often.
Contact – These are cheap cards or tags that have contacts on the surface e.g. a chip and pin bank card.
More difficult to copy than swipe cards but do deteriorate over time.
Passive proximity – These are relatively cheap cards or tags that have small chips inside. They can
transmit the user number a short distance (normally less than 15cm) to a reader. These are less easy to
copy and relatively long living since they receive less wear and the chip is protected inside the card.
Active proximity – These cards use batteries to give a longer range than passive cards. The batteries
are normally long life but depending on use may need to be replaced every few years. Active cards and
tags can be used for longer range access control for vehicle access, comply with the DDA or for “hands
free” access. Typical reading ranges from 0.5m to 10m.
RFID – In access control terms RFID normally refers to contactless smart cards. These cards act very
like passive proximity cards and tags except that they can hold much more data and the reader can
write this data to the card. This enables multiple uses for the card. This type of card can also be used
in off-line access control systems.
Mobile devices – Devices such as phones can operate as a token in a variety of ways. They can use
NFC or Bluetooth Low Energy (BLE) to provide an identity over a short range.
4
Types of Cards
Card access control systems use a card encoded with data that is scanned by a reader at the entry
control point. If the reader determines the card valid, it deactivates the locking system and grants
access to the person with the card. Several different methods are used in encoding information on
cards. The most common are:
i. Magnetic stripe;
ii. Bar code;
iii. Proximity;
iv. Wiegand wire; and
v. Hollerith.
Magnetic cards
These use a magnetic stripe on which data is encoded. These cards are similar to common credit
cards. Card holders may be required to use a personal identification number (PIN).
Proximity cards
These have embedded radio frequency circuits that create resonance frequencies that are read by
the card readers. Unlike other card systems, the proximity card does not require that the card be
inserted into a reader. This allows the reader to be installed behind a wall to protect it from
vandalism and/or harsh environments and allows individuals carrying large parcels to enter
without having to swipe their card through a card reader.
5
Wiegand wire cards
This specially processed small diameter magnetized wire segments are embedded to form
a pattern that, when passed through a reader, produces a sequence of voltage pulses that converts
to a code.
Hollerith cards
These have a pattern of small holes punched into the card that represents data to the card reader.
Most Hollerith cards are read by an optical reader that reads the light pattern passing through the
holes.
6
Key Fobs
Ciphers
Key pads and pins (codes).
BIOMETRIC SYSTEMS
Biometrics use human physiological or behavioural data measurements to determine authorization for
access. They Include:
1. Fingerprint/Finger-vein;
2. Voice pattern;
3. Iris/retina scan;
4. Signature;
5. Palm shape/geometry; and
6. Face recognition.
Voice Pattern
These are designated characteristics that are recorded electronically when a person is given
authorized access. Thereafter, when the individual seeks access, the person’s voice pattern is
measured against the recorded characteristic and, if the measurements are within system
tolerances, access is granted.
Fingerprint/Finger Vein
7
Electronically record fingerprints to include the minute variations in the loops, whorls, and arches.
Variations are compared against the recorded fingerprint at the access control point. These systems
can read fingerprints that are partially illegible from dirt or other causes.
Palm Shape/Geometry
This uses the silhouette of a hand, finger length, and hand proportions, along with the curvature
and webbing between fingers.
Iris/ Retina Scan
These are as unique to a person as fingerprints. In these systems, low-intensity infrared light is
reflected and recorded from numerous checkpoints on the retina. The reflected pattern is then
converted to a digital profile. This computer-stored pattern is compared at the entry control point
through a lens and access is granted or denied based on the comparison.
8
Signature systems
These systems do not compare the actual form of signature. Comparison is made in the dynamics
of the changes in downward pressure and vertical and horizontal pen movements when writing the
signature. Several signatures are obtained to form a base comparator code. This code is compared
at the entry control point using sensors built into a pen or electronic pad.
Face Recognition
9
Closed Circuit Television (CCTV) system is frequently added to the lobby system enabling
the tenant to also see the caller;
Such a system increases the electrical contract cost for an average apartment house 5% to
7%;
Call buttons within apartments can be used to perform any alarm functions required to deal
with an intruder who manages to bypass the lobby security check;
In geriatric (aged) housing designs, these buttons also serve to unlock the apartment door
to allow helpers to enter if summoned by lights and alarms;
In luxury apartment buildings, apartment doors can be monitored from a central security
desk and any unscheduled door movement subjected to immediate investigation;
These systems are custom designed to meet the requirements of the owner.
10
Comparison of Biometric Technologies
Security Containers/Safes/Vaults
Security containers are primarily used to store classified documents, components, materials, and
equipment. In many cases they are also used to secure funds, valuables, communications
equipment, weapons, and controlled substances.
11
Vaults are used to store large amounts of classified documents or materials. Construction of the
vault walls, ceiling, and floor is done locally in accordance with local requirements.
Combination Locks
Combination locks are used on security files, vaults, and strong rooms to protect weapons, money,
precious metals, drugs, and on field safes to protect classified material. There are two basic types
of combination locks that are mounted:
i. Mechanical;
ii. Electromechanical.
A mechanical combination lock requires aligning one or more movable numbered combination
wheels by dialling a correct combination. When the combination wheels are properly aligned, the
locking components are released to permit the locking bolt to retract. An electromechanical
combination lock may use a microprocessor to process and coordinate the dialled combination
with the lock’s correct combination.
DURESS SYSTEM
12
ACTIVE INTRUSION DETECTION SYSTEMS
Elements in an Active Intrusion Detection System:
i. Detection devices or Sensors;
ii. Control Equipment – switches, relays, reset buttons;
iii. Signaling link – wired connection to alarm bells or surveillance service providers or police;
iv. Wired connection to power source – mains or battery;
v. Power source.
Detection Devices or Sensors
i. Mechanical Motion Detectors
This can be used where window foil or fixed contacts are impractical;
This device is a spring mounted contact suspended inside a second contact surface;
Any appreciable motion of the surface on which the device is placed causes the contacts to
connect temporarily, turning in an alarm;
These devices are very sensitive and can be activated by sonic booms, wind, and even a
heavy truck passing by. For this reason, such units are provided with sensitive adjustment.
13
Microwave units are undisturbed by air or noise but because they penetrate solids they can
be affected by mo3on outside the protected area.
COMMAND/CONTROL CENTRE
14