Ads
related to: maglock access control system meaning
Search results
Results From The WOW.Com Content Network
An improved "shear" electromagnetic lock was patented on May 2, 1989, by Arthur, Richard and David Geringer of Security Door Controls, an access control hardware manufacturing firm. The device outlined in their designs was the same in principle as the modern magnetic lock consisting of an electromagnet and an armature plate.
Key control (advantages): Due to the magnetic cylinder elements embedded in the keys, there is a high degree of key control. Unlawful key duplications are minimized by limited access to key blanks (locksmiths) and unique magnetic coding in the key that cannot easily be determined by inspecting the target lock.
However, if the card readers communicate with a central system, it is the system that unlocks the door, not the card reader alone. [3] This allows for more control over the locks; for example, a specific card may only work on certain days of the week or time of day. Which locks can be opened by a card can be changed at any time.
Components of an access control system include: An access control panel (also known as a controller) An access-controlled entry, such as a door, turnstile, parking gate, elevator, or other physical barrier; A reader installed near the entry. (In cases where the exit is also controlled, a second reader is used on the opposite side of the entry.)
Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and ...
In computer security, general access control includes identification, authorization, authentication, access approval, and audit.A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access.