But have you ever wondered how your building’s access control system works? In this article we’ll walk you through the basic features of most access control systems.
The purpose of any access control system is to restrict access to specific doors to qualified personnel, to control when those doors are accessed, and to view historical logs of when certain areas were access and by whom.
Though it may look just like a piece of plastic, each credential has an electronic coil and a unique ID inside of it.
Credentials do not contain batteries and therefore have very long life-cycles. Instead of batteries, credentials have coils inside of them that energize when presented to an energized coil of the same resonant frequency.
The card reader also has an electronic coil inside of it. This coil emits a continuous low-energy pulse, several times a second. When a key card, fob, or tag credential comes in close proximity to the card reader, the electronic coil in the card reader energizes the electronic coil in the credential and the credential transmits its identification number to the reader.
Once the card reader reads a presented credential, it sends the ID of the credential to the door controller. In the door controller resides a copy of the user database, which includes a full list of names and credentials and the access permissions that each person has. When the door controller receives a credential, it decides allow or deny access.
The door controller has lock outputs, or it may have relays that activate an external power source to supply voltage to the lock outputs. Two categories of lock exist: fail-safe and fail-secure. Fail-safe locks will receive voltage to unlock, and fail-secure locks will unlock upon loss of voltage. It’s not uncommon for buildings to have a combination of fail-safe and fail-secure locks. Fail-safe locks are commonly found in building stairwells due to code requirements. Any electromagnetic lock will release upon loss of voltage and they would therefore also be considered “fail-safe”.
A “door contact” is the most common form of door position sensor. The contact is installed in or on the door frame and a magnet is installed in or on the door, so that when the door is closed, the magnet comes very close to the contact. The contact contains a “reed switch” which changes state when a magnet is present. This reed switch wires back to the door controller, and the door controller can know in real time whether the door is open or closed.
A REX is installed on the opposite side of the door from the card reader. While it is the card reader’s job to tell the door controller that someone is trying to get in, the REX’s job is to tell the door controller that someone is trying to leave.
The most common type of REX is a motion detector, mounted above the door on the wall or the ceiling. When the REX detects motion, it will signal an exit event to the door controller. If the door has mechanical exit hardware, the REX is purely for event signaling and preventing “door forced open” events from occurring on the system. In the case of an electromagnetic lock, where the holding force prevents opening the door from either side, the door controller will be programmed to unlock the door upon a REX event.
The door controller receives its database information from an externally managed database. The database contains the latest information of cardholders, access levels, schedules, and any other site-specific information. The database is often in constant communication with the door controllers, and pushes changes down to these controllers automatically any time a change is made. Advanced databases such as the ones running on our Hattrix servers run multiple backups daily, run in a Tier 3 server environment, and provide unparalleled connective uptime. These servers are also capable of emailing customers upon specific system or user events.
The portal is where adminstrators add, edit and delete cardholders, access levels, schedules, holidays, etc. It is also where doors can be manually locked and unlocked, and event reports generated.
On legacy systems, administrators may program their system through the primary database software itself. Modern portals give administrators access to their databases in a number of ways. Modern portals such as the one available on our Hattrix platform allow programming through computers, smartphones and tablets. User workspaces can also be fine-tuned to limit the amount of control that particular users have.
No two access control systems are exactly the same. Point Monitor has a long history of custom applications and solutions for a wide variety of industries. Our team would love to help you design an access control system that’s tailor-made for your building!