Door Access Control Systems can now communicate over IP!

When you use a swipe card/ smart card to enter your office premises, have you wondered what happens in the background before the door opens to let you in? Well a lot! But the focus of our article is to give a small introduction to (door) access control systems and explore how the Internet Protocol (IP) has benefited the access control systems.

What is a Door Access Control System?

An access control system automates the process of allowing authorized users inside a restricted premises (like office, factory, etc) by authenticating them to check if they are authorized to enter. The most common function of an access control system is to open a locked door using electrical/ electro-magnetic locking systems/ relays and closing the door after the user has entered inside – both automatically.

What are the components of a Door Access Control System?

Basically there is a Reader/ sensor – which reads the smart/swipe card details or biometric identification details (like fingerprint). There are unique codes for each employee (embedded in the smart card). The access control reader checks the code obtained from the smart card with the code already stored in a centralized database (Server) against the employee to see if there is a match. If there is, it will activate a relay circuit which in-turn unlocks the door so that the employee can enter in to the premises. For managing multiple readers, there are controllers / control panels.

Where does IP come in, for Access Control Systems?

The various components of access control systems use a number of protocols to communicate with each other (like Wiegand protocol, RS-232, RS-485, etc). But with IP based Access Control Systems, all the communications from the Access Control Server to the Access Control Reader-Controller happens over the Internet Protocol (IP). So, instead of multiple cables, only the Cat x based twisted pair cable (used in LAN), goes to each door. But from there on, reader-controller uses different protocols/ cables to communicate with the relays, automatic door locks, etc.

With IP based Access Control systems, Readers, Controllers & Control Panels are mostly integrated in to a single box. For small deployments, an IP Reader can be deployed on a stand alone basis (as they come with embedded software for management/ storing user credentials). Even two factor authentication can be applied, if required. As you might expect, any IP based system is vulnerable to the same security issues (like hacking, etc) like other network devices and hence strong network security measures are recommended.

What are the advantages of IP based Access Control Systems?

  • Redundancy: IP Networks can be configured for redundancy. So, even if a communication link is cut, the data can be routed through an alternate path – if the network is properly planned. Also, IP based access control readers can store user credentials/ logs which enables them to operate temporarily even if the connection to the central access control server is lost.
  • Power over Ethernet (POE): IP based Access Control Readers support Power over Ethernet technology – So, an additional power cable need not be taken to every door as data and power travel over Cat x Twisted Pair cables (The reader-controller is attached near the door, BTW).
  • Remote Management: If you need to change the settings for individual readers/ access control server – you can do it with a normal web-browser, from anywhere over the Internet.
  • Open Standards: IP means open standards based implementation – Multiple vendor products can co-exist in the same access control network. But, the level of interoperability depends on the vendor.
  • Scalable: Its possible to deploy one IP reader today, and expand to hundreds/ thousands of readers tomorrow. It is even possible for IP based reader-controllers to co-exist along with the normal access control systems – while the expansion happens over IP.
  • Automatic Intimation: IP based access control systems can automatically intimate (using email notifications, for example) the administrator if a reader is down. They can also generate automatic alarms based on set criterion.
  • Integration with other Systems: One of the biggest advantage of IP based Access Control systems is their ability to integrate with other IT software systems/ applications using API (Application Programming Interface). For example, access control systems can update an attendance monitoring system / HRM software.
  • Software as a Service: It is possible to centrally manage the IP based access control systems either from a server/application running on your premises (or) from a server/application running on a managed service provider premises. In the second case, the server and the software is owned and managed by the service provider and customer pays monthly charges, resulting in lower initial investment.
  • Logging: All logs of user activities and administrator activities can be recorded (and can even be exported for external back up). With some access control systems, its possible to determine which employee is in which floor (or location) based on their latest swipe details, in real time.
  • Anti-Passback: With IP based access control systems, anti-passback rules can be applied where an employee cannot pass on his smart card to someone outside without first exiting the door.
  • Corporate Directories: It is possible to integrate IP based access control systems with corporate directories like Active Directory/ LDAP etc, so that the user details held in those directories can be used to automate card holder profile/data creation.

excITingIP.com

You could stay up to date on the various computer networking/ related IT technologies by subscribing to this blog with your email address in the sidebar box that says, ‘Get email updates when new articles are published’